Resource Library

Contact us

The State of Cloud Adoption and Security

With security and compliance more important than ever, see how IT security professionals around the world plan to secure their clouds.

Search our library

Learn how you can take full advantage of the McAfee products you already own, or discover solutions that fit your current business needs. Use the filters below to narrow your search.

Filters

Reset FiltersClear
Case Studies

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Reports

Gartner Market Guide for User and Entity Behavior Analytics

Security and risk management leaders should leverage user and entity behavior analytics to improve their organization's threat detection capabilities across a variety of use cases.

Reports

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

Case Studies

Atrius Health

This company is able to reduce operational costs and combat ransomware with McAfee SIEM solutions and integrated security.

Data Sheets

McAfee SIEM Supported Devices

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

White Papers

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Case Studies

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

Case Studies

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

Case Studies

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

Case Studies

MAUSER Group

Global manufacturer MAUSER realizes its dream of interconnected, adaptive security.

Case Studies

State Agency

This large U.S. state government relies on Intel Security in order to streamline and expand security for virtual machines.

White Papers

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Reports

How Collaboration Can Optimize Security Operations

The new secret weapon against advanced threats

Data Sheets

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

Data Sheets

McAfee Enterprise Security Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheets

McAfee Enterprise Log Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheets

McAfee Advanced Correlation Engine

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Advanced Threat Defense for SIEM

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

White Papers

SIEM Kung Fu

Securosis looks at how to make the most of your current SIEM through advanced use cases and process improvements for optimization.

Case Studies

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top