資源檔案庫

連絡我們

採用雲端和安全性的狀態

有鑑於安全性與符合性較以往更為重要,請瞭解全球 IT 安全性專業人員如何規劃其雲端保護措施。

搜尋我們的資料庫

瞭解如何有效利用您既有的 McAfee 產品,或探索符合您目前企業需求的解決方案。使用下方篩選器可縮小搜尋範圍。

Filters

Reset FiltersClear
個案研究

University Fortifies Protection with Integrated Threat Defense Case Study

With tightly integrated McAfee defenses, Utrecht University in the Netherlands enhanced zero-day threat protection, shrank time from encounter to containment, and simplified security operations.

報告

Automation and Analytics versus the Chaos of Cybersecurity Operations

Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.

個案研究

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

解決方案概要

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

白皮書

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

白皮書

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

白皮書

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

白皮書

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

白皮書

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

白皮書

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

報告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

報告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

白皮書

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

白皮書

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

白皮書

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

白皮書

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

白皮書

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

白皮書

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

報告

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

白皮書

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top