Reference Architecture


Adaptive strategies to address today's top five security concerns.

Read Brochure

The Security Connected platform from McAfee provides a unified framework for hundreds of products, services, and partners. Any organization can improve its security posture and minimize operational costs through its innovative concepts, optimized processes, and practical savings.

Our Reference Architecture provides a concrete path from ideas to implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. Solution guides outline broad security challenges and best practice considerations.

Read White Paper Learn More

Solution Guides

Manage Risk and Security

Limit your exposure to security risks that reveal customer data and internal assets.

Neutralize Advanced Threats

No individual product can catch all attacks, but a system of systems can provide full coverage and minimize the damage and cleanup costs.

Protect Information

Secure sensitive information on databases, file servers, smartphones, email servers, and USB drives — while keeping it accessible to multiple users and groups.

Protect the Data Center

Safeguard the operational backbone of your organization so you can better adapt to the demands of consolidation, virtualization, and cloud platforms.

Securely Enable Social Media

Safely embrace social media activities while mitigating risk, ensuring that you can monitor and better control how sensitive information is shared online.

Achieve Resilient Cyber-Readiness

Learn about the three cyber-readiness solution requirements: continuous asset intelligence, risk assessment across IT and operational assets, and integration with computerized decision support systems.

Continuous Diagnostics and Mitigation

Continuous monitoring is a network lifestyle for greater resilience. It requires a shift in mindset, from reaction and documentation to proactive, data-centric, risk-based action.

Operationalize Intelligence-Driven Response

Learn about the three frameworks required for intelligence-driven response to be effective: decision, detection, and analysis.

Protect Critical Infrastructure

Securing critical infrastructure requires protecting multiple zones, including enterprise IT, SCADA, and industrial control systems (ICS), to meet compliance regulations and ensure continuous system availability.