McAfee

Displaying 1-40 of 168 results

  • Case Studies // Jun 2014

    Fusion Turns to McAfee Next Generation Firewall for Comprehensive Network Security

    Provides Ethernet connectivity, virtualized IT services and managed solutions for the UK and European businesses. Their challenge is to protect customer data on the cloud. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall to protect against Advanced Evasion Techniques (AETs). The results of implementing...

    Provided By McAfee

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • Case Studies // Feb 2014

    SF Police Credit Union Passes Audits Easily with Comprehensive Security Management

    The San Francisco Police Credit Union (SFPCU) provides a wide range of financial services to first responders. Their challenges are to comply with Gramm-Leach-Bliley Act (GLBA) financial privacy regulations and National Credit Union Association (NCUA) guidelines, including Part 748 guidelines for safeguarding and preventing unauthorized access to member information. They...

    Provided By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • Case Studies // Feb 2014

    RWTH Secures Infrastructure and Data with McAfee Next Generation Firewall

    RWTH Aachen is the technical university of the Rhineland-Westphalian city of Aachen in northwest Germany. Their challenge is to protect network from malware attacks while ensuring high performance and availability. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall automatically distributes RWTH's incoming and outgoing...

    Provided By McAfee

  • Case Studies // Jan 2014

    Cloud and Compliance In One Thanks to McAfee Enterprise Security Manager

    As a system integrator, DTS Systeme GmbH has supported customers for 30 years in operations related to IT environments. Their challenges are to compliance, reduction of administrative compliance tasks and integration of security and compliance into the cloud environment with a SIEM solution. They chose McAfee to overcome these challenges....

    Provided By McAfee

  • White Papers // Nov 2013

    What's Holding Back the Cloud?

    This Peer Research Report captures key findings from a survey of 800 IT professionals and provides insight into cloud computing security concerns, and how those concerns might be alleviated. Use it to better understand: Specific issues IT professionals have about cloud security, and how they differ between public cloud...

    Provided By McAfee

  • White Papers // Nov 2013

    Securing your evolving datacenter

    Your datacenter is evolving - your datacenter security should be evolving too. Key security technologies and services - most of which are already very familiar from their traditional use in a physical, on-premise context - are being adapted by leading solution providers to work across a broad range of physical...

    Provided By McAfee

  • White Papers // Nov 2013

    Next Generation Datacenter Security

    With 69% of APAC companies planning to adopt a hybrid cloud deployment model you need to read this SANS report and discover why a layered security approach for your virtual infrastructure needs to be a priority.

    Provided By McAfee

  • White Papers // Nov 2013

    Five Questions for the Next-Generation Data Center Security Architect

    The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively. They will require a new generation of security architectures that are equally flexible and scalable. This McAfee Solution Brief examines the challenges developments in server, storage and network...

    Provided By McAfee

  • Case Studies // Oct 2013

    Consolidating on McAfee Saves the State of Alaska $3.8 Million

    Alaska is the largest US state in area and larger than 18 sovereign countries. Their challenges are to efficiently and effectively secure citizen data across data centers, endpoints, and networks for 16 state agencies as well as rural citizens - all while cutting security costs and managing future cost projections....

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • Case Studies // Aug 2013

    Endpoint Protection. Independent Reports name the market leaders.

    The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.This Magic Quadrant takes an extensive look at the strengths and cautions of...

    Provided By McAfee

  • White Papers // Aug 2013

    Freeform Dynamics Report - The End User Security Jigsaw

    Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts. A global study of 977 IT and business professionals provided...

    Provided By McAfee

  • White Papers // Aug 2013

    SANS Survey on Mobility/BYOD Security Policies and Practices

    In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet, 38% do not have the policies they feel are necessary.Learn why you need to implement stronger...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Enterprise Mobility Management Solution Brief

    How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?

    Provided By McAfee

  • White Papers // Aug 2013

    NSS Labs - Comparative Analysis Exploit Protection

    NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. See the results and analysis...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Database Security: Real time protection for business-critical databases without downtime

    Poorly protected databases are a cybercriminal’s dream come true. They contain your company’s most valuable, easily exploitable data—all nicely packaged in convenient locations. It’s understandable why databases are the leading target of sophisticated cyberattacks by hackers and are increasingly exploited by privileged users inside of organizations. However, there’s plenty you...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Vulnerability Manager for Databases: Comprehensive assessment of risk to your sensitive data

    You store your most valuable and sensitive data in a database, but most vulnerability assessment products don’t know enough about database systems to thoroughly test them, putting your data at risk. Practically every week there’s yet another announcement of a major data breach. McAfee® Vulnerability Manager for Databases automatically discovers...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches

    Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patches have been released by database management system (DBMS) providers, placing that sensitive data at risk. McAfee® Virtual Patching for...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Compliance

    Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in many forms—business disruption, bad publicity, stiff fines for noncompliance, and undermined confidence with the existing base of customers,...

    Provided By McAfee

  • White Papers // Apr 2013

    Database Security in Virtualization and Cloud Computing Environments

    Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable.By deploying memory-based solutions for distributed database monitoring, enterprises will...

    Provided By McAfee

  • White Papers // Apr 2013

    Overcoming the Challenges of Database Patching in Production Environments

    The frequency and sophistication of attacks shows no signs of declining; and today’s economic climate does not allow for more resources to be applied to the challenging task of testing and applying physical patches promptly upon their release. Combined with the compliance framework of SOX, HIPAA, PCI DSS, and the...

    Provided By McAfee

  • White Papers // Apr 2013

    Technology and approach for providing real-time, comprehensive protection for all types of databases.

    Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasure. The most effective way to protect any database is with effective multilayered database protection. Compliance officers and regulators know...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Security

    A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for...

    Provided By McAfee

  • Case Studies // Mar 2013

    Secure Single Sign-On Enables Migration to the Cloud

    The Platinum group of companies, which includes Allied United Insurance and top finance company, is a financial services organization. Their challenges are to ensure end-user acceptance and adoption of new SaaS solutions, provide Single Sign-On (SSO) for SaaS applications and manage provisioning and automated deprovisioning of SaaS accounts and synchronize...

    Provided By McAfee

  • White Papers // Jan 2013

    Top Five Reasons to Deploy a Dedicated Database Security Solution

    This McAfee whitepaper highlights the top 5 reasons why protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, not to mention ensuring regulatory compliance. Further to this, these reasons highlight how many organizations still rely on security solutions...

    Provided By McAfee

  • White Papers // Jan 2013

    Hardening database security and compliance without sacrificing availability or performance

    McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

    Provided By McAfee

  • Case Studies // Apr 2009

    Purdue University Protects 25,000 Systems in Highly Distributed Environment With McAfee Total Protection for Endpoint

    Purdue University, located in West Lafayette, Indiana, is the flagship university of the five campuses within the Purdue University System, and one of the largest university systems in the United States. University needed to protect the PC and Mac desktops and servers from virus, spyware, and other malware attacks is...

    Provided By McAfee

  • Case Studies // Apr 2009

    Georgia Department of Human Resources Relies on McAfee to Protect Against Incoming Spam and Malware

    The Georgia Department of Human Resources is the state's largest agency with 19,000 employees in 159 counties. It provides health and social services to the state's citizens. It needed to manage overwhelming volume of spam and malware, while freeing up IT resources and personnel. It deployed McAfee Email Gateway (IronMail)...

    Provided By McAfee

  • Case Studies // Feb 2009

    Abtran Meets Its Clients' Increasing Security Requirements With McAfee Security Risk Management Solutions

    Abtran is a market leader in delivering Business Process Outsourcing (BPO). Its focus is on strategic, mutually beneficial partnerships with major corporate and government clients in domestic and international markets. Abtran needed to comply with increasing client security requirements and PCI. Because intrusion detection and prevention is a key requirement...

    Provided By McAfee

  • Case Studies // Feb 2009

    McAfee Total Protection for Endpoint - Advanced Simplifies Security Risk Management at Ellis Hospital

    Ellis Hospital, based in Schenectady, New York, includes a 360-bed, full-service health care facility, a School of Nursing, a mental health clinic, the 40-bed Bellevue Women's Center, and three small patient centers for administering inoculations and drawing blood. Ellis Hospital needs to keep patient data and systems secure using minimal...

    Provided By McAfee

  • Case Studies // Mar 2009

    Wyeth Enlists McAfee to Protect Global IT Environment From Pervasive Threats

    Wyeth, headquartered in Madison, New Jersey, is one of the largest research-based pharmaceutical and healthcare-product companies in the world, dedicated to solving the world's most critical health problems through substantial investments in research and development. It required delivering reliable protection for Wyeth's more than 54,000 desktops. Wyeth's IT security team...

    Provided By McAfee

  • Case Studies // Feb 2009

    McAfee Vulnerability Manager Remediates System Vulnerabilities and Mitigates Risks at CSU, Chico

    At California State University, Chico, (CSU, Chico), popularly known as "Chico State," the Information Security Office (ISEC) is tasked with protecting the university's more than 500 servers, databases, and applications across 15 different operating systems. CSU, Chico needed a comprehensive enterprise vulnerability management system that could be managed primarily by...

    Provided By McAfee

  • Case Studies // Mar 2009

    McAfee Total Protection Service Protects Chamber of Commerce PCs With Less Effort and Expense

    Located in East Texas, not far from the Louisiana border, the county of Nacogdoches (pronounced nack-a-doe-chus), is home of Stephen F. Austin State University, "Texas Forest Country," and just over 60,000 residents. The Chamber of Commerce has limited in-house IT expertise and resources to devote to IT security. The Chamber...

    Provided By McAfee

  • Case Studies // May 2009

    McAfee Helps ARC Stay PCI-Compliant While Processing $80 Million in Travel Expenditures Annually

    Airlines Reporting Corporation (ARC) provides financial services, data products and services, ticket distribution, original travel solutions, and settlement services to the travel industry. To comply with PCI, the company must prevent credit card information from leaking, either accidentally or maliciously. Three McAfee Network DLP appliances monitor incoming and outgoing data...

    Provided By McAfee

  • Case Studies // Feb 2009

    Citrix Systems Reduces Risk by Standardizing on McAfee 's Integrated Security Risk Management Platform

    Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 215,000 organizations worldwide rely on Citrix to deliver applications of any kind to users anywhere. Citrix needed to protect its global infrastructure and endpoints 24/7. Adding to its existing arsenal of McAfee security...

    Provided By McAfee

  • Case Studies // Jun 2009

    Standardizing on McAfee for Complete Endpoint Protection Saves the State of New York Millions of Dollars While Increasing Security

    With 19 million New York citizens to support, the State's Chief Information Officer/Office for Technology (CIO/OFT) ensures that the New York state executive branch's 106 departments - including the departments of transportation, children and family services, and labor, and offices of the governor and homeland security - operate seamlessly to...

    Provided By McAfee

  • Case Studies // Feb 2009

    McAfee EPO 4.0 Minimizes Time Spent on Threat Protection at University of Utah Health Sciences Center

    University of Utah Health Sciences Center (UUHSC) is a division of University Health Care - a large healthcare network and medical training institution that consists of a number of hospitals, clinics, specialty healthcare centers, medical schools, and research centers. It needed one IT administrator must effectively protect the network from...

    Provided By McAfee

  • Case Studies // Feb 2009

    Boston Medical Center Turns to McAfee Network Security Platform and McAfee ToPS for Endpoint to Protect Vital Clinical Services

    Boston Medical Center (BMC) is a private, not-for-profit, medical center with 581 beds, located in Boston's historic South End. BMC allows partner connections into their environment to access a variety of services. BMC cannot dictate security policies and procedures to them but needs to mitigate risk. BMC also needed stronger...

    Provided By McAfee

  • White Papers // Apr 2009

    Unify Endpoint and Network Security With McAfee Network Access Control (NAC)

    Most NAC solutions available to date have been complex, costly, inaccurate, non-scalable, and not secure. McAfee Unified Secure Access is the world's first NAC solution to unify endpoint and network security with access control and compliance. Its adaptive policy technology surpasses current NAC solutions by controlling access and securing networks...

    Provided By McAfee

  • Webcasts // Jan 2009

    Hacking Exposed Webinar

    The presenter of this webcast outlines the state of hacking as it exists today. He also profiled three contemporary hacks with associated countermeasures. The hacks profiled include hacking the web: Cross-Site Request Forgery, Hacking SSL: SSLstripe, Hacking the Phone: What happens when the root access "feature".

    Provided By McAfee

  • Webcasts // May 2009

    Selecting the Right Protection

    McAfee understands that in these economic times companies are feeling the pressure to seek out solutions to protect their most vital information assets. And whether at rest, in motion, or in use - these solutions need to provide increased protection and efficiency while decreasing costs. The presenter of this webcast...

    Provided By McAfee

  • White Papers // May 2009

    Making VoIP Secure: Proactive Network Intrusion Prevention for Enterprises and Service Providers

    This white paper takes a close look at security concerns associated with Voice over Internet Protocol (VoIP). It discusses how network architects can minimize the risks associated with converged networks by designing the network itself to include security as a key component. Ensuring network availability and quality of service are...

    Provided By McAfee

  • White Papers // Feb 2009

    Security Solutions for Small Businesses and Remote Branch Offices

    Small- and mid-sized businesses face as high a risk in cyber-space as larger enterprises - the risks know no distinction as to an organization's size. Historically, cost and complexity were barriers to small businesses finding appropriate security solutions that were right for them. With limited budgets and staff, these businesses...

    Provided By McAfee

  • White Papers // Jan 2009

    McAfee Web Security Service Technical White Paper

    Most security efforts lose effectiveness over time. Any changes in the web server, web applications, or other infrastructure configuration, can unintentionally open the door to security hazards. With so many new threats identified each day, one needs to continually test the security measures and decide which risks are the most...

    Provided By McAfee

  • White Papers // Jul 2009

    Inside the Password-Stealing Business: The Who and How of Identity Theft

    This paper outlines contemporary attack techniques used in the most advanced and prevalent password stealing malware families, it explains the tricks of the trade (such as on-screen keyboards) used to attack banks latest security mechanisms, and it dissects a new target of password-stealing behavior - massive multiplayer online role-playing games...

    Provided By McAfee

  • White Papers // Apr 2009

    Financial Fraud and Internet Banking: Threats and Countermeasures

    To reach the gullible as well as the experienced, cybercriminals are developing new attack methods and new traps. One example is clickjacking. Also known as UI redress attack, this web-related structural weakness can fool users when they view a web page made of two layers. While users believe they are...

    Provided By McAfee

  • White Papers // Jul 2012

    Endpoint Security Anti Virus alone is Not Enough

    Aberdeen's analysis confirms the prevailing wisdom that endpoint security based on anti-virus software alone is not enough, particularly given the technology mega-trends (e.g., social, mobile, cloud) that are dramatically transforming our IT computing infrastructure, and the corresponding changes in the security threat landscape. Further to this, the report concludes that...

    Provided By McAfee

  • White Papers // Jul 2012

    Enforcing Endpoint Compliance

    This technical brief looks at how to Police managed and unmanaged systems with Network Access Control (NAC). It explore the current situation and driving concerns such as when employees bring in their own laptops, tablets, and smartphones or a business unit decides to hire contractors and increasing support for remote...

    Provided By McAfee

  • White Papers // Jul 2012

    Magic Quadrant for Security Information and Event Management

    Download Gartner's Magic Quadrant to see how McAfee stacks up against the competition. McAfee's high-performance, powerful security information and event management (SIEM) brings event, threat and risk data together to provide strong security intelligence, rapid incident response, seamless log management and extensible compliance reporting. At the core of the SIEM...

    Provided By McAfee

  • White Papers // Jul 2012

    Get proactive about managing risk

    Managing risk through security and compliance continues to be a leading concern of organizations the world over, however, meeting the requirements of increasingly demanding regulations while reducing exposure to the new classes of sophisticated threats and having an accurate understanding of risk and compliance at any point in time is...

    Provided By McAfee

  • White Papers // Jul 2012

    Coordinate operations with real-time intelligence

    Historically, enterprises have taken a very reactive and tactical approach to implement security and risk programs, deploying point-security solutions only after an incident and loss of data. Such fragmented technologies fail to provide adequate protection across heterogeneous IT infrastructures, leaving companies exposed across unsupported systems, especially as many of the...

    Provided By McAfee

  • White Papers // Jul 2012

    Protecting databases: Boosting security against today's attacks and loss vectors

    The number of data breaches has hit an all-time high, and 47 percent of attacks take just minutes or hours to go from point of entry to compromise. The bad guys act on a timeline of minutes and days, and the good guys work on a timeline of weeks to...

    Provided By McAfee

  • White Papers // Jul 2012

    Protecting valuable data assets

    It's no surprise that malicious insiders and external attackers alike covet sensitive information such as intellectual property, financial records and personal information. This information has value, and therefore it's a target. Difficulties arise when organisations understand just how much sensitive information they have. As a global leader in Enterprise Security,...

    Provided By McAfee

  • White Papers // Jul 2012

    Risk and compliance outlook 2012

    Avoid check-box compliance and fire drill responses to security in favor of sustained, continuous and actionable risk management programs that address IT security as a business risk. This global study highlights how IT decision-makers view and address the challenges of risk and compliance management in a highly regulated and increasingly...

    Provided By McAfee

  • White Papers // Jul 2012

    Security Management 2.0: Time to Replace Your SIEM?

    This white paper from Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate - if the benefits outweigh the risks. This paper details: Platform evolution and requirements Selection and decision...

    Provided By McAfee

  • White Papers // Jan 2009

    McAfee Web Security Service

    Most security efforts lose effectiveness over time. Any changes in the web server, web applications, or other infrastructure configuration, can unintentionally open the door to security hazards. With so many new threats identified each day, one needs to continually test the security measures and decide which risks are the most...

    Provided By McAfee

  • White Papers // Mar 2009

    The Carbon Footprint of Email Spam Report

    All email users throughout the world, including consumers and businesses, struggle with the scourge of spam email. The costs and risks associated with spam have been well documented and have led to attempts by both government and private industry to curtail spam, notably the United States legislature's CAN-SPAM Act of...

    Provided By McAfee

  • White Papers // Jan 2009

    2009 Threat Predictions: Slumping Economy Drives Malware Threats

    Malware is a business, and that business is thriving. Gone are the days of virus writing for notoriety. More than 90 percent of the malware written today consists of password-stealing Trojans and downloaders with one goal in mind: to find valuable data. The shift in threats from virus writing to...

    Provided By McAfee

  • White Papers // Jan 2009

    Access Protection in McAfee VirusScan Enterprise and Host Intrusion Prevention

    Securing networks against a wide range of threats - viruses, spyware, worms, rootkits, and Trojans - is more challenging than ever. Whether it's a global enterprise or a small or medium-sized business that has a full-time security staff, VSE ensures that endpoint servers, desktops, and laptops remain malware free. VSE...

    Provided By McAfee

  • White Papers // Oct 2008

    The Changing Face of Vulnerabilities

    Although social engineering does not play a role in all forms of security threats, McAfee Avert Labs has observed a growing trend recently: malware writers using social engineering to exploit software vulnerabilities. With the recent trends in vulnerabilities, social engineering is a force that is difficult to combat. No matter...

    Provided By McAfee

  • White Papers // Jun 2008

    Dashboard and Reporting for IT GRC: McAfee Risk and Compliance Manager

    McAfee Risk and Compliance Manager offers a solution that addresses assessment, policy, internal controls, reporting, remediation, continuous auditing, and third-party reviews. It is a network-based solution that can also use agent-based solutions as well. The Risk and Compliance Manager requires no additional software or hardware changes to the infrastructure. A...

    Provided By McAfee

  • White Papers // Jan 2009

    The McAfee Gateway Anti-Malware Engine: Protecting Users From Emerging Malware Threats

    Malware is a sophisticated business. Unlike the good old days when attacks were perpetrated by individual malcontents, today's malware developers are organized into sophisticated, disciplined teams. What's more, they are constantly probing and refining their attacks to inflict maximum damage or reap the highest profitability - or both. This white...

    Provided By McAfee

  • White Papers // Feb 2009

    How Virtualization Affects PCI DSS Part 1: Mapping PCI Requirements and Virtualization

    Theft of credit/debit card information - also referred to as Cardholder Data (CHD) - is increasing with the steady rise in Internet shopping and e-commerce as well as the use of potentially risky technologies such as wireless networking. The Payment Card Industry Data Security Standard (PCI DSS) was established by...

    Provided By McAfee

  • White Papers // Feb 2009

    How Virtualization Affects PCI DSS Part 2: A Review of the Top 5 Issues

    Achieving Payment Card Industry (PCI) compliance in a virtualized environment is very much attainable. It simply requires one to understand the intent of each of the requirements and how these are impacted by virtualization. As one goes through this process it will quickly find, in most organizations, that each of...

    Provided By McAfee

  • White Papers // Dec 2008

    The McAfee SECURE Standard

    The McAfee SECURE standard is an aggregate of industry best practices, designed to provide a level of security that an online merchant can reasonably achieve to help provide consumers with better protection when interacting with websites and shopping online. Vulnerability assessment and the subsequent required remediation are costs that many...

    Provided By McAfee

  • Case Studies // Mar 2009

    McAfee Solves Rampant Spyware Problem for Temecula Schools

    The Temecula Valley Unified School District consists of 31 elementary, middle and high schools in and around the city of Temecula, southeast of Los Angeles. The district faced chronic spyware infections that degraded network performance and consumed an estimated 70 percent of technical support resources. Temecula replaced its existing security...

    Provided By McAfee