資源檔案庫

連絡我們

採用雲端和安全性的狀態

有鑑於安全性與符合性較以往更為重要,請瞭解全球 IT 安全性專業人員如何規劃其雲端保護措施。

搜尋我們的資料庫

瞭解如何有效利用您既有的 McAfee 產品,或探索符合您目前企業需求的解決方案。使用下方篩選器可縮小搜尋範圍。

Filters

Reset FiltersClear
白皮書

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

白皮書

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

報告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

報告

"Unifying Data Protection with McAfee "

This ESG report examines how McAfee data protection solutions help discover and protect data on premises and in cloud applications and services.

白皮書

When Visibility Is Not Enough

Visibility is essential to any data security framework, but organizations also must focus on stopping critical data from leaving the enterprise.

白皮書

Safeguarding Vital Data Is a Battle You Can Win

Safeguarding vital data has emerged as one of the most significant threats to effective corporate process. This white paper discusses the many options for planning and executing responses to this widespread threat.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs