資源檔案庫

連絡我們

採用雲端和安全性的狀態

有鑑於安全性與符合性較以往更為重要,請瞭解全球 IT 安全性專業人員如何規劃其雲端保護措施。

搜尋我們的資料庫

瞭解如何有效利用您既有的 McAfee 產品,或探索符合您目前企業需求的解決方案。使用下方篩選器可縮小搜尋範圍。

Filters

Reset FiltersClear
報告

Automation and Analytics versus the Chaos of Cybersecurity Operations

Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.

報告

The Show Must Go On! 2017 SANS Incident Response Survey

Incident response is seeing a pivotal industry shift, as continuous consumption of threat intelligence and automated endpoint detection and remediation take hold.

視覺資訊圖表

The Changing Landscape of Cybersecurity Analytics and Operations

Integration and automation are the answer to fragmented security operations, tool complexity, and a rapidly changing threat landscape.

白皮書

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

解決方案概要

Optimizing Security Operations

Integrate and automate security operations for more effective threat and risk management.

報告

How Collaboration Can Optimize Security Operations

The new secret weapon against advanced threats

解決方案概要

Advanced Threat Defense for SIEM

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

白皮書

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

白皮書

Achieving Security through Compliance

This paper will illustrate how a well-structured security governance program with fully developed and implemented policies, plans, and procedures will strengthen an organization’s security posture.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs