McAfee
Displaying 1-40 of 155 results
-
Freeform Dynamics Report - The End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard...
Sponsored By McAfee
-
SANS Survey on Mobility/BYOD Security Policies and Practices
In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet...
Sponsored By McAfee
-
McAfee Enterprise Mobility Management Solution Brief
How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints...
Sponsored By McAfee
-
NSS Labs - Comparative Analysis Exploit Protection
NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 20...
Sponsored By McAfee
-
Endpoint Protection. Independent Reports name the market leaders.
The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and b...
Sponsored By McAfee
-
Counter Stealth Attacks
The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they do...
Sponsored By McAfee
-
Counter Stealth Attacks
The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they do...
Provided By McAfee
-
Technology and approach for providing real-time, comprehensive protection for all types of databases.
Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasur...
Provided By McAfee
-
A Practical Guide to Database Security
A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the tr...
Provided By McAfee
-
McAfee Database Security: Real time protection for business-critical databases without downtime
Poorly protected databases are a cybercriminal’s dream come true. They contain your company’s most valuable, easily exploitable data—all nicely packaged in convenient locations. It’s understandable wh...
Provided By McAfee
-
Database Security in Virtualization and Cloud Computing Environments
Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply...
Provided By McAfee
-
McAfee Vulnerability Manager for Databases: Comprehensive assessment of risk to your sensitive data
You store your most valuable and sensitive data in a database, but most vulnerability assessment products don’t know enough about database systems to thoroughly test them, putting your data at risk. P...
Provided By McAfee
-
McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches
Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patc...
Provided By McAfee
-
A Practical Guide to Database Compliance
Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in m...
Provided By McAfee
-
Overcoming the Challenges of Database Patching in Production Environments
The frequency and sophistication of attacks shows no signs of declining; and today’s economic climate does not allow for more resources to be applied to the challenging task of testing and applying ph...
Provided By McAfee
-
Top Five Reasons to Deploy a Dedicated Database Security Solution
This McAfee whitepaper highlights the top 5 reasons why protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizati...
Provided By McAfee
-
Hardening database security and compliance without sacrificing availability or performance
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Provided By McAfee
-
HIPAA/HITECH Compliance for Databases: Comply fully and reduce database security risk
HIPAA and HITECH require all individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren’t prescriptive wh...
Provided By McAfee
-
PCI DSS Compliance for Databases: Comply fully and reduce database security risk
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security...
Provided By McAfee
-
McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It is good common sense to secure databases as well as or better than othe...
Provided By McAfee
-
Not all database security solutions are created equal. Compare solutions from different vendors.
Databases are the number one target of cybercriminals and disgruntled insiders. Traditional perimeter and network security, as well as built-in database security measures, offer only limited protectio...
Provided By McAfee
-
Securing and controlling laptops
This technical brief explores the need for remote devices carry confidential data on the front line, which is far from the defences layered into the corporate network. It explores the driving concerns...
Provided By McAfee
-
The evolving landscape of desktop security
The desktop security landscape has been evolving due to multiple factors, including targeted malware, end-user convenience concerns, and IT support and operations costs. This solution brief explains a...
Provided By McAfee
-
Five reasons to simplify your security
This brief speaks about how today's threats to endpoints and data are more complex, more numerous, more varied--and changing every second. It also highlights the need for a new solution to do more tha...
Provided By McAfee
-
5 Reasons to simply your life
This brief speaks about how today's threats to endpoints and data are more complex, more numerous, more varied?and changing every second and highlights the need for a new solution to do more than tra...
Provided By McAfee
-
Security Management 2.0: Time to Replace Your SIEM?
This white paper from Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to mi...
Provided By McAfee
-
Assessing vulnerabilities
Take the stress out of "keeping up" with the torrent of vulnerabilities with greater dynamic visibility. New vulnerabilities are disclosed by Microsoft, Adobe, and other vendors on an almost daily bas...
Provided By McAfee
-
Endpoint Security Anti Virus alone is Not Enough
Aberdeen's analysis confirms the prevailing wisdom that endpoint security based on anti-virus software alone is not enough, particularly given the technology mega-trends (e.g., social, mobile, cloud) ...
Provided By McAfee
-
Enforcing Endpoint Compliance
This technical brief looks at how to Police managed and unmanaged systems with Network Access Control (NAC). It explore the current situation and driving concerns such as when employees bring in their...
Provided By McAfee
-
Magic Quadrant for Security Information and Event Management
Download Gartner's Magic Quadrant to see how McAfee stacks up against the competition. McAfee's high-performance, powerful security information and event management (SIEM) brings event, threat and ris...
Provided By McAfee
-
Get proactive about managing risk
Managing risk through security and compliance continues to be a leading concern of organizations the world over, however, meeting the requirements of increasingly demanding regulations while reducing ...
Provided By McAfee
-
Coordinate operations with real-time intelligence
Historically, enterprises have taken a very reactive and tactical approach to implement security and risk programs, deploying point-security solutions only after an incident and loss of data. Such fra...
Provided By McAfee
-
Protecting databases: Boosting security against today's attacks and loss vectors
The number of data breaches has hit an all-time high, and 47 percent of attacks take just minutes or hours to go from point of entry to compromise. The bad guys act on a timeline of minutes and days, ...
Provided By McAfee
-
Protecting valuable data assets
It's no surprise that malicious insiders and external attackers alike covet sensitive information such as intellectual property, financial records and personal information. This information has value,...
Provided By McAfee
-
Risk and compliance outlook 2012
Avoid check-box compliance and fire drill responses to security in favor of sustained, continuous and actionable risk management programs that address IT security as a business risk. This global stud...
Provided By McAfee
-
Assessing vulnerabilities (German)
Take the stress out of "keeping up" with the torrent of vulnerabilities with greater dynamic visibility. New vulnerabilities are disclosed by Microsoft, Adobe, and other vendors on an almost daily bas...
Provided By McAfee
-
Improve email security with a hybrid solution
From appliances, software and virtualised environments, businesses have typically used on-premise solutions for their email security solutions. As departments cut costs, many businesses are finding a ...
Provided By McAfee
-
Malware 101: What CIOs should know
What does a botnet do? Why was Stuxnet a benchmark for data theft? Why should CIOs care about attack strategies? To fend off these threats, enterprise defences will need to move out of the traditiona...
Provided By McAfee
-
Scaling security from, in and for the cloud
The cloud isn't without its risks, says Scott Chasin, McAfee's chief technology officer, SaaS. Hackers have already taken notice of the interest and demand for cloud-based computing. Where there's inf...
Provided By McAfee
-
Hone Your Web 2.0 Strategy
Understand the opportunities and challenges of enabling users to share information on cloud applications. Learn Web 2.0 security best practices from experts and decision makers worldwide.
Provided By McAfee
-
Counter Stealth Attacks
The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they do...
Sponsored By McAfee
-
Freeform Dynamics Report - The End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard...
Sponsored By McAfee
-
SANS Survey on Mobility/BYOD Security Policies and Practices
In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet...
Sponsored By McAfee
-
McAfee Enterprise Mobility Management Solution Brief
How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints...
Sponsored By McAfee
-
NSS Labs - Comparative Analysis Exploit Protection
NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 20...
Sponsored By McAfee
-
Endpoint Protection. Independent Reports name the market leaders.
The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and b...
Sponsored By McAfee
-
Securing and controlling laptops
This technical brief explores the need for remote devices carry confidential data on the front line, which is far from the defences layered into the corporate network. It explores the driving concerns...
Provided By McAfee
-
The evolving landscape of desktop security
The desktop security landscape has been evolving due to multiple factors, including targeted malware, end-user convenience concerns, and IT support and operations costs. This solution brief explains a...
Provided By McAfee
-
Five reasons to simplify your security
This brief speaks about how today's threats to endpoints and data are more complex, more numerous, more varied--and changing every second. It also highlights the need for a new solution to do more tha...
Provided By McAfee
-
Assessing vulnerabilities (German)
Take the stress out of "keeping up" with the torrent of vulnerabilities with greater dynamic visibility. New vulnerabilities are disclosed by Microsoft, Adobe, and other vendors on an almost daily bas...
Provided By McAfee
-
Webcast: The Ever-Evolving Threats in Today's IT Security Environment
Keep abreast of recent changes in the IT security threat landscape by listening to this TechRepublic Webcast featuring Dave Marcus, Security Research Communications Manager for McAfee® Avert® Labs, an...
Provided By McAfee
-
Data Loss Prevention Program: Safeguarding Intellectual Property
One of the major challenges for today's IT security professional is having a strong awareness of the type of data and value of the data that they are responsible for protecting. No matter how robust t...
Provided By McAfee
-
Hacking the Kiosk: Managing the Risk of Public Information Systems
Managing the security of information systems in today's interconnected world is a complex and challenging task. Maintaining an accurate perception of an enterprise's digital security posture is key to...
Provided By McAfee
-
Security Solutions for Small Businesses and Remote Branch Offices
Small- and mid-sized businesses face as high a risk in cyber-space as larger enterprises - the risks know no distinction as to an organization's size. Historically, cost and complexity were barriers t...
Provided By McAfee
-
McAfee Web Security Service Technical White Paper
Most security efforts lose effectiveness over time. Any changes in the web server, web applications, or other infrastructure configuration, can unintentionally open the door to security hazards. With ...
Provided By McAfee
-
Inside the Password-Stealing Business: The Who and How of Identity Theft
This paper outlines contemporary attack techniques used in the most advanced and prevalent password stealing malware families, it explains the tricks of the trade (such as on-screen keyboards) used to...
Provided By McAfee
-
Financial Fraud and Internet Banking: Threats and Countermeasures
To reach the gullible as well as the experienced, cybercriminals are developing new attack methods and new traps. One example is clickjacking. Also known as UI redress attack, this web-related structu...
Provided By McAfee
-
Malware in Men - Will You Be Protected?
Computers continue to increase their influence in many aspects of today's society, and that trend shows no signs of slowing down. It sees computers in almost all walks of life, from satellites to cell...
Provided By McAfee
-
The Rise of AutoRun - Based Malware
Seeing the popularity of removable storage, virus authors realized the potential of using this media as an infection vector. And they are greatly aided by a convenience feature in operating systems ca...
Provided By McAfee
-
The Changing Face of Compliance Validation
This paper will highlight the transformational changes that are now occurring in compliance validation, auditing technologies, and the standards that provide the underlying foundation for the next maj...
Provided By McAfee
-
McAfee Avert Labs Top 10 Threat Predictions for 2008
As 2007 comes to a close, it's a good time to reflect on the current threat landscape. The past 12 months comprised a record-breaking year. McAfee recorded well over 100,000 new viruses and Trojans, a...
Provided By McAfee
-
PMI Confirms That Its Network Safeguards Confidential Customer Data
PMI Mortgage Insurance Co. provides a range of mortgage insurance products for homeowners and lending institutions. PMI needed to mature and evolve its security practices, verify the strength of its v...
Provided By McAfee
-
The Real Costs of Sarbanes Oxley
This paper introduces and empirically assesses the real costs associated with Sarbanes-Oxley. After providing a brief overview of Sarbanes Oxley in the first section, a theoretical framework for real ...
Provided By McAfee
-
Insecure Trends in Web Technologies: A Review of Insecure Implementations of Rich Internet Applications
This paper discusses various security risks associated with social networks and the insecure implementations of major web technologies Ajax, Flash and Silverlight. As a specific case study it presents...
Provided By McAfee
-
Key Components of a Risk-Based Security Plan: How to Create a Plan That Works
Information security has long been considered a secondary IT function. As a result, information security budgeting has been minimal and often misallocated solely as a part of the general IT budget. CI...
Provided By McAfee
-
Managing a Malware Outbreak
For the vast majority of organizations, finding out they are under attack from a virulent, aggressive piece of malware is a stressful prospect. Not knowing what the malware is doing, or is capable of ...
Provided By McAfee
-
Mobile Application Security Testing
The consumer mobile application market has seen explosive growth in the last couple of years. These applications have provided convenient access to bank accounts, credit card data, Personally Identifi...
Provided By McAfee
-
Web Browsers: An Emerging Platform Under Attack
The first layer of malware defense should be placed at the network perimeter and be managed centrally. This helps the IT person in charge sleep better. This layer alone can't replace proper patch mana...
Provided By McAfee
-
802.11 Attacks: Version 1.0
IEEE 802.11 refers to the set of standards set forth by the Institute of Electrical and Electronics Engineers (IEEE). More specifically, working group 11 of the 802 category for LAN/MAN technologies h...
Provided By McAfee
-
2007 Top 10 Malicious Code Trends
This paper focuses and details the trends that were observed in the evolution of malicious code over the course of 2007. It identifies the growth of different categories of malicious code, the means u...
Provided By McAfee
-
Cox Communications Stops More Than 90,000 Messages Each Hour With Connection Control of McAfee Email Gateway
Cox Communications is the third-largest cable provider in the United States. The company wanted to circumvent the need for additional Exchange servers due to exponential increase in spam volume; maint...
Provided By McAfee
-
Intelsat Relies on McAfee to Safeguard Proprietary Flight Networks
Intelsat is the worldwide leader in fixed satellite services. Intelsat wanted to secure its corporate environment, which includes the satellite networks that serve customers, its satellite ISP service...
Provided By McAfee
-
Protecting Your Critical Assets: Lessons Learned From "Operation Aurora"
As Operation Aurora highlighted, Advanced Persistent Threats (APT) are an increasingly common form of complex and directed attacks that use insidious techniques for gaining access to privileged system...
Provided By McAfee
-
VoIP Vulnerabilities
Voice over Internet Protocol (VoIP) is a method for making phone calls over the Internet or using private networks. Traditional phone calls must travel over a series of switches and circuits owned by ...
Provided By McAfee
-
Change Management: Practical Guidance For Managers On How To Prepare For Successful Audits
This paper, "IT Audit Checklist: Change Management," supports an internal audit of the organization's change management policies in order to verify compliance and look for opportunities to improve eff...
Provided By McAfee
-
STAMPing Out Email Risk: Seven Technologies for Advanced Mail Protection
Email is today's primary medium of business communications. As such, it presents a rich target for hackers, spammers, and malware owners, and a vulnerability to careless or malicious insiders. Regulat...
Provided By McAfee
-
TeliaSonera AB Strengthens Anti-Virus Security Confidence With McAfee
The largest telecommunications provider in Sweden and Finland, offering mobile and fixed network services to the Nordic and Baltic countries. The company was facing the problems like Computer viruses ...
Provided By McAfee
-
Securely Registering Applications
One of the more powerful and popular features that modern day operating systems offers its end users and administrators is the ability to register applications that can be automatically initiated. The...
Provided By McAfee
-
Security Training - Why It Benefits Your Organization and How to Make Your Case to Management
The current economic climate makes it tempting for many companies to cut their training budgets, and limit the amount of long term investment that is made in its staff. It believes a better idea is to...
Provided By McAfee
-
Software Security: Going Beyond the Development Phase
This paper has covered three of the activities that it believe should exist as part of a security enhanced software development life cycle for it to be successful in improving the security of applicat...
Provided By McAfee