Resource Library

Contact us

The State of Cloud Adoption and Security

With security and compliance more important than ever, see how IT security professionals around the world plan to secure their clouds.

Search our library

Learn how you can take full advantage of the McAfee products you already own, or discover solutions that fit your current business needs. Use the filters below to narrow your search.

Filters

Reset FiltersClear
Solution Brief

Build a Coordinated and Unified Defense

The joint solution from McAfee and Phantom reduces complexity and improves operational efficiency through integrated, adaptive, and orchestrated intelligence and response. It helps security teams work smarter by automating repetitive tasks.

Solution Brief

Enhanced Network Traffic Analysis for McAfee Enterprise Security Manager

The integration of SS8 with McAfee Enterprise Security Manager enables you to quickly discover sophisticated long-tail attacks and investigate breach behavior with pinpoint accuracy, down to specific devices of interest.

Solution Brief

Infoblox and McAfee for Unified Security

The integrated solution from Infoblox and McAfee provides visibility into DNS and web traffic, plugs the DNS security gap in organizations, and automates data sharing between Infoblox DNS, DHCP, IPAM, (DDI) and McAfee product suites.

Solution Brief

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Cisco and McAfee have interconnected their platforms and ecosystems for comprehensive visibility, threat context sharing, and real-time security orchestration based on policies. DXL threat intelligence fabric now interoperates with pxGrid, Cisco’s open security information grid, to share contextual information and execute threat mitigation actions among any application connected to either fabric.

White Paper

Integrating SIEM into Your Threat Hunting Strategy

The smart use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today's threatscape we cannot ignore any of the three. Effective integration of SIEM as the hub and an arsenal of threat investigation tools as the spokes is critical to gaining enhanced visibility of the hazards coming down the road.

Data Sheet

McAfee Data Exchange Layer

McAfee Data Exchange Layer (DXL) allows enterprises and developers to easily connect, share data, and orchestrate security tasks across applications using a real-time communication fabric.

Data Sheet

McAfee Database Event Monitor for SIEM

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee DLP Monitor

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Control for Aerospace and Defense

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Control for Consumer and Home Networking

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Control for Healthcare

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Control for Retail

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Embedded Reputation SDK

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Endpoint Protection for SMB

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheet

McAfee Endpoint Protection—Advanced Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Brief

Protect the Endpoint’s Vulnerability to Uncatalogued Malware

McAfee and ACS bring you two cybersecurity solutions to stop zero-day keyloggers from capturing credentials to advance an attack and a multifactor, out-of-band authentication solution that prevents data theft by man-in-the middle attacks.

Data Sheet

McAfee Cloud Enablement Services for McAfee ePO

By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency.

Data Sheet

McAfee Investigator

McAfee Investigator places advanced automation and analytics within reach of every SOC. Expert systems and endpoint capture tools integrate with existing data sources and security management systems for rapid time to value and minimal effort.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top