資源檔案庫

連絡我們

採用雲端和安全性的狀態

有鑑於安全性與符合性較以往更為重要,請瞭解全球 IT 安全性專業人員如何規劃其雲端保護措施。

搜尋我們的資料庫

瞭解如何有效利用您既有的 McAfee 產品,或探索符合您目前企業需求的解決方案。使用下方篩選器可縮小搜尋範圍。

Filters

Reset FiltersClear
資料工作表

McAfee Enterprise Security Manager for Engineers-II Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

資料工作表

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

資料工作表

McAfee Enterprise Security Manager for Analysts-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Analysts to understand, communicate, and use the solution’s features.

資料工作表

McAfee Enterprise Security Manager for Engineers-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

個案研究

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

個案研究

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through Intel Security solutions.

個案研究

Cut-e GmbH

This company achieved transparent security status with McAfee Enterprise Security Manager.

個案研究

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

個案研究

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

個案研究

Government Statistics Agency

Large South American government agency embraces enterprise integrated security approach.

個案研究

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

個案研究

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

資料工作表

McAfee Solution Services for SIEM

Essential Services for McAfee SIEM Solutions

資料工作表

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

白皮書

10 Ways to Accelerate Time to Detection and Response

Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.

白皮書

Integrating SIEM into Your Threat Hunting Strategy

The smart use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today's threatscape we cannot ignore any of the three. Effective integration of SIEM as the hub and an arsenal of threat investigation tools as the spokes is critical to gaining enhanced visibility of the hazards coming down the road.

資料工作表

McAfee Database Activity Monitoring

For a technical summary on the McAfee product listed above, please view the product data sheet.

解決方案概要

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

報告

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

白皮書

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top