資源檔案庫

連絡我們

採用雲端和安全性的狀態

有鑑於安全性與符合性較以往更為重要,請瞭解全球 IT 安全性專業人員如何規劃其雲端保護措施。

搜尋我們的資料庫

瞭解如何有效利用您既有的 McAfee 產品,或探索符合您目前企業需求的解決方案。使用下方篩選器可縮小搜尋範圍。

Filters

Reset FiltersClear
解決方案概要

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

白皮書

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

白皮書

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

白皮書

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

報告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

白皮書

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

白皮書

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

白皮書

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

報告

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

白皮書

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

個案研究

Desjardins

Canadian investment company, The Desjardins Group, views McAfee Enterprise Support with a McAfee Resident Support Account Manager (RSAM) as an invaluable resource for maintaining a stable, up-to-date infrastructure and strong security posture.

報告

Executive Summary: Disrupting the Disruptors, Art or Science?

Get an overview of the key findings from the Disrupting the Disruptors report, and see how adding proactive threat hunting and advanced analytics can give you the edge over attackers.

解決方案概要

Unified Least Privilege, Endpoint Security, and Threat Intelligence

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

解決方案概要

SIA Solution Brief: BeyondTrust

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

報告

The Show Must Go On! 2017 SANS Incident Response Survey

Incident response is seeing a pivotal industry shift, as continuous consumption of threat intelligence and automated endpoint detection and remediation take hold.

個案研究

Gothenburg

Learn how the Swedish city of Gothenburg saves 40 hours per week after deploying a lightweight, yet powerful, security client solution—McAfee Endpoint Security.

解決方案概要

McAfee Certification Program FAQ

Learn about certification paths, training prerequisites, exam registration, and more.

解決方案概要

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

報告

Pathfinder Report: Machine Learning Raises Security Teams to the Next Level

While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious.

個案研究

Canadian Retailer Embraces an Integrated Defense (LCBO) Case Study

The Liquor Board of Ontario embraces an adaptable threat defense infrastructure from McAfee, allowing it to efficiently and effectively manage security, including finding and responding to cyberthreats in minutes across its extended enterprise.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top