mcafee

Results 326 - 350 of 378Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Published By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : 
yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy, truste, bbb, reputation, ssl, verisign, scanning
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Jelly Bean increased ROI and conversions by implementing McAfee SECURE™ service and building trust with their visitors. Download today!
Tags : 
jelly belly, mcafee, secure, service, roi, conversions, trustmark, website security, certification
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how certifying a web site to the McAfee Data Security Standard improved online conversions for Littman Brothers. Download today!
Tags : 
littman brothers, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ID Card Group increased sales and conversions with McAfee SECURE ™ service. Download today!
Tags : 
b2b, retailer id, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ROUSH improves online marketing and builds trust and rapport by increasing trust and security of their online site. Learn more today!
Tags : 
roush, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : 
container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Foreclosures.com differentiates itself from competition by displaying the McAfee SECURE™  trustmark. Learn more today!
Tags : 
foreclosure, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee     Published Date: Oct 28, 2013
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Tags : 
hacking, malware, advanced evasion, aet, stonesoft, network security, next generation firewall, ngfw, evasion technique for dummies, mcafee, firewall, software development, it management
    
McAfee
Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats, malware, nss
    
McAfee
Published By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
mcafee, av-test, deep defender, rootkits, detection
    
McAfee
Published By: McAfee     Published Date: Nov 06, 2013
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
mcafee, endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
Published By: McAfee     Published Date: Jul 10, 2013
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Published By: McAfee     Published Date: Jan 22, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
mcafee, gartner, endpoint protection
    
McAfee
Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, business technology
    
McAfee
Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: CopiaTECH     Published Date: Mar 18, 2008
Every network needs Total Protection. This buyer's guide discusses McAfee’s Suite offerings to help you choose the right software for your organization.
Tags : 
mcafee, copiatech
    
CopiaTECH
Published By: Focus     Published Date: Jul 29, 2010
Cut through the confusion surrounding network technologies and implementation. Download our free SMB Networking Buyer's Guide today.
Tags : 
3com, at&t, backup, belkin, buffalo, ca arcserve, charter, cisco, citrix, client security, comcast, cox, coyote point systems, d-link systems, dell, earthlink, enterasys, f5 networks, fluke networks, ibm
    
Focus
Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management
    
McAfee
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.