mcafee

Results 26 - 50 of 378Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
mcafee, intel, security, data, cloud, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security, enterprise applications
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration.
Tags : 
mcafee, intel, security, data, exfiltration, enterprise applications, data management, business technology
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : 
mcafee, intel, security, dlp, securosis, networking, software development, knowledge management
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
mcafee, intel, security, content, protection, business technology, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : 
mcafee, intel, security, malware, cyber, threat, networking, data management, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : 
mcafee, intel, security, threat, strategy, enterprise applications
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
Get free access ($195 value) to this Gartner research that identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users. CISOs should avoid these practices, and they can do so without sacrificing security posture or breaking the bank.
Tags : 
mcafee, intel, security, gartner, report, network, networking, business technology, research
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : 
mcafee, intel, security, cyber, criminal, networking, data management
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management, siem, security event management
    
Intel Security
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: McAfee     Published Date: Nov 01, 2010
McAfee Total Protection for Server: Security and Compliance from a Single Solution
Tags : 
mcafee total protection, server, security, compliance
    
McAfee
Published By: McAfee     Published Date: Nov 01, 2010
IT managers in mid-size organizations need servers to be reliable. Read this white paper to find out more.
Tags : 
mcafee, server security, vulnerability
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack
    
McAfee
Published By: McAfee     Published Date: May 07, 2014
An in depth look at stealth crimeware, the damage it can cause and how you can protect against it.
Tags : 
stealth crimeware, mcafee, malware, spyware, protection
    
McAfee
Published By: McAfee     Published Date: May 07, 2014
An introduction and overview of McAfee Real Time Command.
Tags : 
real time command, mcafee, enterprise assets, control
    
McAfee
Published By: McAfee     Published Date: May 07, 2014
A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.
Tags : 
endpoint protection platforms, gartner, mcafee, epp analysis
    
McAfee
Published By: McAfee     Published Date: May 07, 2014
A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.
Tags : 
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.