Resource Library

Contact us

The State of Cloud Adoption and Security

With security and compliance more important than ever, see how IT security professionals around the world plan to secure their clouds.

Search our library

Learn how you can take full advantage of the McAfee products you already own, or discover solutions that fit your current business needs. Use the filters below to narrow your search.

Filters

Reset FiltersClear
Data Sheet

Security and Compliance in the Medical Industry

McAfee solutions protect networked medical systems and data, detect threats, and correct damage, helping medical device manufacturers and OEMs keep devices secure and compliant.

Data Sheet

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Brief

Keep Your Data Safe for Office 365

McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

Solution Brief

McAfee Data Loss Prevention for Healthcare

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

Solution Brief

McAfee Data Protection for Energy

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

Solution Brief

McAfee Data Protection for Retail

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

Solution Brief

McAfee Data Protection for the Biotech and Pharmaceutical Industry

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top