mcafee

Results 1 - 25 of 333Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : 
endpoint attack, endpoint protection, security, nss
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Modern malware now masks itself to evade detection. It hides by piggybacking or misusing legitimate applications. With state-of-the-art threat detection and containment tools from Intel Security, organizations can unmask the most sophisticated hidden threats.
Tags : 
malware. threat detection, intel security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Organizations looking for more intelligence and automation within their security defenses should include endpoint detection and response solutions to thwart new threats and protect endpoint-accessible assets.
Tags : 
endpoint detection, intel security, threat defense, endpoint protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
1,400 IT Security professionals from around the globe report their organizations have been adopting cloud at a rapid pace and trusting more sensitive data to reside there.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : 
data center, networking
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : 
data center, networking
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Gartner, Inc. has positioned McAfee as a Leader in the Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Get access to this valuable Gartner research, $1,995.00 USD value, compliments of McAfee.
Tags : 
gartner mq, gartner magic quadrant, intrusion prevention systems, vips, ips, magic quadrant ips
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and  enterprises
Tags : 
virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops 
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : 
unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Any single approach to security monitoring cannot satisfy all requirements. Security analysts need a set of complementary technologies which can coexist.
Tags : 
security analytics, advanced threats, uba, security monitoring
    
McAfee
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.