McAfee

Displaying 1-40 of 122 results

  • Case Studies // Mar 2015

    Mexican Land Office Protects Critical Data and Streamlines Security Management

    The Instituto Registral y Catastral del Estado de Puebla (IRCEP) is the land office for the Mexican state of Puebla. Their challenge is to provide accurate and legally valid property descriptions to support real estate transactions. They chose McAfee to overcome this challenge. They have implemented VirusScan enterprise software, data...

    Provided By McAfee

  • Case Studies // Jan 2015

    CDCR Streamlines Security Management with "Security Connected" Strategy

    The California Department of Corrections and Rehabilitation (CDCR) oversee 34 state adult prisons and three juvenile facilities, a variety of community correctional facilities. Their challenge is protecting sensitive data over a wide security landscape with limited staff. They chose McAfee overcome this challenge. They have implemented network security platform, enterprise...

    Provided By McAfee

  • Case Studies // Jan 2015

    Advanced Firewall Protection for Global MPLS Network

    MAUSER Group has been in business for 118 years as a manufacturer of industrial packaging products for the chemical and petrochemical, pharmaceutical, and food and beverage industries. In today's connected world, data security has become a critical factor in helping the company maintain its industry leadership and customer loyalty. Data...

    Provided By McAfee

  • Case Studies // Jan 2015

    Global Retailer Secures Virtual Business Infrastructure with McAfee MOVE AntiVirus

    Global membership-style warehouse retailer has made virtualization of its IT infrastructure a top priority. Their challenge is to protect virtualized enterprise without hampering business. They chose McAfee to overcome this challenge. They have implemented management for optimized virtual environments AntiVirus, host intrusion prevention for desktop, VirusScan enterprise, endpoint encryption and...

    Provided By McAfee

  • Case Studies // Dec 2014

    Intel Security Upgrades Its Network Security with McAfee Next Generation Firewall

    Intel Security World's leading dedicated security vendor. McAfee, a part of Intel Security, is devoted to empowering businesses, service providers, the public sector and home users to safely experience the benefits of the Internet. Their challenge is to install latest next-generation firewalls to block advanced threats. They chose McAfee to...

    Provided By McAfee

  • Case Studies // Dec 2014

    Leading Hosted IT Provider Drives Growing MSP Business with Security Connected

    Macquarie Telecom provides end-to-end hosting and communications for the delivery of corporate communications and applications. Their challenge is to evolve security services to ensure clients have maximum protection in an evolving threat landscape. They chose McAfee to overcome this challenge. They have implemented MSP program, ePolicy orchestrator (McAfee ePO), VirusScan...

    Provided By McAfee

  • Case Studies // Dec 2014

    Security Connected Framework: Driving Compliance and Protecting 24,000 Endpoints

    Sutherland Global Services is an international provider of Business Process Outsourcing (BPO) and technology management services. Their challenge is to protect sensitive data and ensure cost-effective compliance with PCI and HIPAA. They chose McAfee to overcome this challenge. They have implemented ePolicy Orchestrator (McAfee ePO) software, endpoint protection advanced, host...

    Provided By McAfee

  • Case Studies // Dec 2014

    McAfee Enterprise Security Manager Delivers Managed Security Services for the Provincial Government of New Brunswick

    The Government of New Brunswick (GNB) administers 33 departments and agencies providing the full range of government services. Their challenges are to manual, decentralized security incident response, lacking consolidated, correlated event management and scale out managed security services across 33 departments. They chose McAfee to overcome these challenges. They have...

    Provided By McAfee

  • Case Studies // Nov 2014

    Bank Central Asia Achieves Compliance and Saves Time with McAfee ePO Software

    Bank Central Asia (BCA) is a publicly owned Indonesian bank. Their challenge is to protect network, systems and data and comply with industry and internal regulations. They chose McAfee to overcome this challenge. They have implemented ePO software, endpoint protection suite, network security platform, enterprise mobility management and vulnerability manager....

    Provided By McAfee

  • White Papers // Oct 2014

    Demand More

    Your adoption of NGFWs should bring a substantial increase in the range of protections and controls you can apply to your network. Basic NGFW features such as crude application control provide a starting point for your checklist. However, basic features are just the beginning. You can demand other valuable features.......

    Provided By McAfee

  • White Papers // Oct 2014

    Eight Must-Have Features for Ultimate Network Security Resource Optimization

    The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your...

    Provided By McAfee

  • White Papers // Oct 2014

    The Security Industry’s Dirty Little Secret

    One of hackers’ dirty little secret weapons used to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community where they are well known and have been in widespread use for several years there are...

    Provided By McAfee

  • Case Studies // Jun 2014

    Fusion Turns to McAfee Next Generation Firewall for Comprehensive Network Security

    Provides Ethernet connectivity, virtualized IT services and managed solutions for the UK and European businesses. Their challenge is to protect customer data on the cloud. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall to protect against Advanced Evasion Techniques (AETs). The results of implementing...

    Provided By McAfee

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • Case Studies // Feb 2014

    SF Police Credit Union Passes Audits Easily with Comprehensive Security Management

    The San Francisco Police Credit Union (SFPCU) provides a wide range of financial services to first responders. Their challenges are to comply with Gramm-Leach-Bliley Act (GLBA) financial privacy regulations and National Credit Union Association (NCUA) guidelines, including Part 748 guidelines for safeguarding and preventing unauthorized access to member information. They...

    Provided By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • Case Studies // Feb 2014

    RWTH Secures Infrastructure and Data with McAfee Next Generation Firewall

    RWTH Aachen is the technical university of the Rhineland-Westphalian city of Aachen in northwest Germany. Their challenge is to protect network from malware attacks while ensuring high performance and availability. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall automatically distributes RWTH's incoming and outgoing...

    Provided By McAfee

  • Case Studies // Jan 2014

    Cloud and Compliance In One Thanks to McAfee Enterprise Security Manager

    As a system integrator, DTS Systeme GmbH has supported customers for 30 years in operations related to IT environments. Their challenges are to compliance, reduction of administrative compliance tasks and integration of security and compliance into the cloud environment with a SIEM solution. They chose McAfee to overcome these challenges....

    Provided By McAfee

  • White Papers // Nov 2013

    What's Holding Back the Cloud?

    This Peer Research Report captures key findings from a survey of 800 IT professionals and provides insight into cloud computing security concerns, and how those concerns might be alleviated. Use it to better understand: Specific issues IT professionals have about cloud security, and how they differ between public cloud...

    Provided By McAfee

  • White Papers // Nov 2013

    Securing your evolving datacenter

    Your datacenter is evolving - your datacenter security should be evolving too. Key security technologies and services - most of which are already very familiar from their traditional use in a physical, on-premise context - are being adapted by leading solution providers to work across a broad range of physical...

    Provided By McAfee

  • White Papers // Nov 2013

    Next Generation Datacenter Security

    With 69% of APAC companies planning to adopt a hybrid cloud deployment model you need to read this SANS report and discover why a layered security approach for your virtual infrastructure needs to be a priority.

    Provided By McAfee

  • White Papers // Nov 2013

    Five Questions for the Next-Generation Data Center Security Architect

    The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively. They will require a new generation of security architectures that are equally flexible and scalable. This McAfee Solution Brief examines the challenges developments in server, storage and network...

    Provided By McAfee

  • Case Studies // Oct 2013

    Consolidating on McAfee Saves the State of Alaska $3.8 Million

    Alaska is the largest US state in area and larger than 18 sovereign countries. Their challenges are to efficiently and effectively secure citizen data across data centers, endpoints, and networks for 16 state agencies as well as rural citizens - all while cutting security costs and managing future cost projections....

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    NSS Labs - Comparative Analysis Exploit Protection

    NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. See the results and analysis...

    Provided By McAfee

  • Case Studies // Aug 2013

    Endpoint Protection. Independent Reports name the market leaders.

    The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.This Magic Quadrant takes an extensive look at the strengths and cautions of...

    Provided By McAfee

  • White Papers // Aug 2013

    Freeform Dynamics Report - The End User Security Jigsaw

    Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts. A global study of 977 IT and business professionals provided...

    Provided By McAfee

  • White Papers // Aug 2013

    SANS Survey on Mobility/BYOD Security Policies and Practices

    In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet, 38% do not have the policies they feel are necessary.Learn why you need to implement stronger...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Enterprise Mobility Management Solution Brief

    How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • Case Studies // Dec 2012

    Building on a Secure Foundation with McAfee Solutions

    MidWestOne financial group is the fifth largest bank holding company in the state of Iowa. Their challenge is to continue to evolve security infrastructure to meet new and emerging threats. They chose McAfee to overcome this challenge. They have implemented McAfee firewall enterprise, McAfee email gateway, McAfee global threat intelligence...

    Provided By McAfee

  • Case Studies // Feb 2010

    McAfee Helps Holme Roberts & Owen LLP Increase Productivity and Better Serve Its Clients by Reducing Email Threats

    Holme Roberts & Owen LLP (HRO) is a denver-based law firm with more than 200 attorneys. Their challenge is to reduce spam; eliminate the burden of spam management to the end-user; reduce attorney billable hours spent on spam management; and reduce IT administration costs. They chose McAfee to overcome this...

    Provided By McAfee

  • Case Studies // Jul 2012

    McAfee Works With Dongfeng Nissan to Launch a New Era of Information Security

    Dongfeng Nissan passenger vehicle company (hereinafter referred to as Dongfeng Nissan) is a company engaged in research related to passenger vehicles. Their challenges are to data leakage, loss of critical research and development information, and brand impact and existence of security vulnerabilities and risks in the network, and tracking of...

    Provided By McAfee

  • Case Studies // Aug 2012

    Global Information and Communications Technology Company Trusts McAfee

    CSS Corp is a global Information and communications technology company with expertise in designing, developing, deploying, and managing end-to-end IT and network services. Their challenge is to manage vast and complex security infrastructure with limited IT staff and provide enterprise protection and ensure compliance. They chose McAfee to overcome this...

    Provided By McAfee

  • Case Studies // Feb 2010

    McAfee Policy Auditor and McAfee Remediation Manager with McAfee Network Security Platform Keep Online Businesses Secure and Compliant

    James Tower is a full-service Internet marketing e-commerce solutions provider. Their challenge is to manually applying patches to keep compliant with PCI DSS and other security requirements had become too costly, inefficient, and risky. They chose McAfee to overcome this challenge. They have implemented McAfee policy auditor; McAfee remediation manager;...

    Provided By McAfee

  • Case Studies // Apr 2012

    NitroSecurity SIEM Reduces McAfee Administrative, Analytic, and Compliance Time While Improving Security Posture

    Intel Corporation is the world's largest dedicated security technology company. Their challenge is to Provide the highest level of visibility and situational awareness to protect critical information and infrastructure, achieve PCI compliance, and leverage virtual machines in the McAfee security infrastructure. They chose McAfee to overcome this challenge. They have...

    Provided By McAfee

  • Case Studies // Oct 2013

    Consolidating on McAfee Saves the State of Alaska $3.8 Million

    Alaska is the largest US state in area and larger than 18 sovereign countries. Their challenges are to efficiently and effectively secure citizen data across data centers, endpoints, and networks for 16 state agencies as well as rural citizens - all while cutting security costs and managing future cost projections....

    Provided By McAfee

  • Case Studies // Jan 2014

    Cloud and Compliance In One Thanks to McAfee Enterprise Security Manager

    As a system integrator, DTS Systeme GmbH has supported customers for 30 years in operations related to IT environments. Their challenges are to compliance, reduction of administrative compliance tasks and integration of security and compliance into the cloud environment with a SIEM solution. They chose McAfee to overcome these challenges....

    Provided By McAfee

  • Case Studies // Dec 2011

    New York City to Save More Than $18 Million Over Five Years by Consolidating and Centralizing Security

    New York City Department of Information Technology and Telecommunications (DoITT) oversees the use of technology in city government operations. Their challenges are to cut costs yet protect systems, networks, and customer's data across a highly distributed, federated IT environment. They chose McAfee to overcome these challenges. They have implemented McAfee...

    Provided By McAfee

  • Case Studies // Jan 2012

    McAfee Solutions Put Professional Information Giant Informa in Control of Their Security

    Informa provides businesses, professionals, and academics around the world with knowledge, up-to-the-minute information, and highly specialized skills and services. Their challenge is they needed to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more. They chose McAfee to overcome this challenge. They have...

    Provided By McAfee

  • Case Studies // Mar 2013

    Secure Single Sign-On Enables Migration to the Cloud

    The Platinum group of companies, which includes Allied United Insurance and top finance company, is a financial services organization. Their challenges are to ensure end-user acceptance and adoption of new SaaS solutions, provide Single Sign-On (SSO) for SaaS applications and manage provisioning and automated deprovisioning of SaaS accounts and synchronize...

    Provided By McAfee

  • Case Studies // Aug 2011

    Implementing Real-Time Database Activity Monitoring at the University of Bristol

    Like many educational institutions, the University of Bristol has both an extremely open environment and a highly dynamic user base. Their challenge is to protect sensitive data from privileged insiders as well as external threats. They chose McAfee to overcome this challenge. They have implemented McAfee database activity monitoring and...

    Provided By McAfee

  • Case Studies // Feb 2014

    SF Police Credit Union Passes Audits Easily with Comprehensive Security Management

    The San Francisco Police Credit Union (SFPCU) provides a wide range of financial services to first responders. Their challenges are to comply with Gramm-Leach-Bliley Act (GLBA) financial privacy regulations and National Credit Union Association (NCUA) guidelines, including Part 748 guidelines for safeguarding and preventing unauthorized access to member information. They...

    Provided By McAfee

  • Case Studies // Aug 2012

    McAfee ePO Deep Command Software Future-Proofs Client Security at Man

    Man is a world-leading independent asset manager dedicated to alternative and long-term investing. Their challenge is to streamline client support while maintaining high security and compliance. They chose McAfee to overcome this challenge. They have implemented McAfee ePO deep command software with Intel AMT. The results of implementing McAfee were...

    Provided By McAfee

  • Case Studies // Oct 2012

    Comprehensive Protection for Morpho's Globally Deployed Mobile Devices

    A division of the Safran group based in France, Morpho is a global leader in security solutions. Their challenge is to protect highly sensitive and proprietary technical data that is shared among mobile devices. They chose McAfee to overcome this challenge. They have implemented McAfee Enterprise Mobility Management (McAfee EMM)...

    Provided By McAfee

  • Case Studies // Jul 2011

    WNS Protects Global, Multisite Infrastructure with McAfee Integrated Security Platform

    Headquartered in Mumbai, India, WNS (Holdings) Limited (NYSE: WNS), a leading provider of global Business Process Outsourcing (BPO) services. Their challenge is with a lean IT security workforce, the challenge is to provide comprehensive, centralized protection for customer data and business processes across multiple and global sites. They chose McAfee...

    Provided By McAfee

  • Case Studies // Dec 2011

    SIM University Counts on McAfee to Protect University Network and Ensure Learning Management System Availability 24/7

    SIM University is Singapore's only privately funded university dedicated to the educational needs of working professionals and adult learners. Their challenge is to enable students to use online learning management system yet protect network against Internet-based threats that use up bandwidth and can cause significant damage. They chose McAfee to...

    Provided By McAfee

  • Case Studies // Oct 2011

    McAfee Helps Xinjiang Mobile Tackle Data Security Issues

    China Mobile Group Xinjiang Company limited is the only telecommunications operator in Xinjiang focused on the development of mobile communication. Their challenges are to prevent leakage of data from the Telco's core network and manage and control USB devices, flash drives and other removable storage devices. They chose McAfee to...

    Provided By McAfee

  • Case Studies // Feb 2010

    Dawnay Day AV Standardizes on McAfee to Protect Network from Future Attacks

    Dawnay Day AV is a financial services provider and advisory firm headquartered in Mumbai, India. Their challenge is to proactively safeguard its network and internal systems from future virus attacks. They chose McAfee to overcome this challenge. They have implemented McAfee network security platform, McAfee email and web security appliance,...

    Provided By McAfee

  • Case Studies // Feb 2010

    County of Orange Improves Communication and Collaboration, Reduces Spam, and Saves Taxpayer Dollars

    The three million residents of the third-largest county in the United States. Their challenge is to county of orange needs to control the increasing volume of spam and virus threats with a fully integrated, scalable solution that is easy to deploy and manage. They chose McAfee to overcome this challenge....

    Provided By McAfee

  • Case Studies // Jun 2014

    Fusion Turns to McAfee Next Generation Firewall for Comprehensive Network Security

    Provides Ethernet connectivity, virtualized IT services and managed solutions for the UK and European businesses. Their challenge is to protect customer data on the cloud. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall to protect against Advanced Evasion Techniques (AETs). The results of implementing...

    Provided By McAfee

  • Case Studies // Feb 2014

    RWTH Secures Infrastructure and Data with McAfee Next Generation Firewall

    RWTH Aachen is the technical university of the Rhineland-Westphalian city of Aachen in northwest Germany. Their challenge is to protect network from malware attacks while ensuring high performance and availability. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall automatically distributes RWTH's incoming and outgoing...

    Provided By McAfee

  • Case Studies // Nov 2010

    McAfee Web Gateway Protects Students and Staff in Walnut Valley Unified School District from Web-Based Threats

    The Walnut Valley Unified School District in Southern California serves approximately 16,000 students and staff at 15 schools. Their challenges are to protect students from undesirable websites, comply with CIPA and more effective web filtering minimizes viruses and malware. They chose McAfee to overcome these challenges. They have implemented McAfee...

    Provided By McAfee

  • White Papers // Oct 2014

    Demand More

    Your adoption of NGFWs should bring a substantial increase in the range of protections and controls you can apply to your network. Basic NGFW features such as crude application control provide a starting point for your checklist. However, basic features are just the beginning. You can demand other valuable features.......

    Provided By McAfee

  • White Papers // Oct 2014

    Eight Must-Have Features for Ultimate Network Security Resource Optimization

    The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your...

    Provided By McAfee

  • White Papers // Oct 2014

    The Security Industry’s Dirty Little Secret

    One of hackers’ dirty little secret weapons used to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community where they are well known and have been in widespread use for several years there are...

    Provided By McAfee

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • Case Studies // Jul 2012

    McAfee SECURE Service Converts Highly Skeptical E-Commerce CEO

    FootageFirm is the leading provider of royalty-free high quality stock video footage from around the world. Their challenge is when building the VideoBlocks website, Holland started with a clean slate. With what they calls a 'Test and run, test and optimize' mindset, they set out to create an online destination...

    Provided By McAfee

  • Case Studies // Oct 2011

    Foreclosures.com Locks in Higher Sales with McAfee SECURETM Service

    Foreclosures have been helping individuals navigate the real estate world. Their challenge is to replace a separate PCI Approved Scan Vendor (ASV) with a bundled service including PCI, vulnerability and web application security scanning, in addition to a site security trustmark. They chose McAfee to overcome this challenge. They implemented...

    Provided By McAfee

  • Case Studies // Oct 2011

    B2B Retailer ID's McAfee SECURE Service as Path to Higher Sales

    A B2B supplier of ID equipment and supplies, the company provides the security and marketing industries with equipment. Their challenge is the ID card market is a highly competitive vertical and online sales an increasingly important channel and traffic is driven through a combination of paid and organic search activity...

    Provided By McAfee

  • Case Studies // Oct 2011

    Pamela for Skype and Pamfax Use Mcafee Secure Trustmark to Message Security

    Pamela for Skype was created to provide enhanced functionality - like voice mail - that was missing from the earliest versions of Skype. Their challenge is awareness of security grows; people are developing real concerns about faxing communication security. Security concerns are one of the reasons why faxing remains a...

    Provided By McAfee

  • White Papers // Feb 2009

    How Virtualization Affects PCI DSS Part 2: A Review of the Top 5 Issues

    Achieving Payment Card Industry (PCI) compliance in a virtualized environment is very much attainable. It simply requires one to understand the intent of each of the requirements and how these are impacted by virtualization. As one goes through this process it will quickly find, in most organizations, that each of...

    Provided By McAfee

  • White Papers // Jun 2008

    Dashboard and Reporting for IT GRC: McAfee Risk and Compliance Manager

    McAfee Risk and Compliance Manager offers a solution that addresses assessment, policy, internal controls, reporting, remediation, continuous auditing, and third-party reviews. It is a network-based solution that can also use agent-based solutions as well. The Risk and Compliance Manager requires no additional software or hardware changes to the infrastructure. A...

    Provided By McAfee

  • White Papers // Jul 2009

    Inside the Password-Stealing Business: The Who and How of Identity Theft

    This paper outlines contemporary attack techniques used in the most advanced and prevalent password stealing malware families, it explains the tricks of the trade (such as on-screen keyboards) used to attack banks latest security mechanisms, and it dissects a new target of password-stealing behavior - massive multiplayer online role-playing games...

    Provided By McAfee

  • Webcasts // Jan 2009

    Hacking Exposed Webinar

    The presenter of this webcast outlines the state of hacking as it exists today. He also profiled three contemporary hacks with associated countermeasures. The hacks profiled include hacking the web: Cross-Site Request Forgery, Hacking SSL: SSLstripe, Hacking the Phone: What happens when the root access "feature".

    Provided By McAfee

  • Webcasts // May 2009

    Selecting the Right Protection

    McAfee understands that in these economic times companies are feeling the pressure to seek out solutions to protect their most vital information assets. And whether at rest, in motion, or in use - these solutions need to provide increased protection and efficiency while decreasing costs. The presenter of this webcast...

    Provided By McAfee