McAfee

Displaying 1-40 of 122 results

  • Case Studies // May 2015

    Partners for the Long Haul: Kleberg Bank Relies on Intel Security for Comprehensive Protection

    Kleberg Bank, N.A. is an independent community bank serving the South Texas cities of Kingsville and Corpus Christi and the surrounding region. Their challenge is shield network from ever-evolving malware threats and support ongoing compliance. They chose McAfee to overcome this problem. They have implemented McAfee complete endpoint protection -...

    Provided By McAfee

  • Case Studies // Mar 2015

    Mexican Land Office Protects Critical Data and Streamlines Security Management

    The Instituto Registral y Catastral del Estado de Puebla (IRCEP) is the land office for the Mexican state of Puebla. Their challenge is to provide accurate and legally valid property descriptions to support real estate transactions. They chose McAfee to overcome this challenge. They have implemented VirusScan enterprise software, data...

    Provided By McAfee

  • Case Studies // Jan 2015

    CDCR Streamlines Security Management with "Security Connected" Strategy

    The California Department of Corrections and Rehabilitation (CDCR) oversee 34 state adult prisons and three juvenile facilities, a variety of community correctional facilities. Their challenge is protecting sensitive data over a wide security landscape with limited staff. They chose McAfee overcome this challenge. They have implemented network security platform, enterprise...

    Provided By McAfee

  • Case Studies // Jan 2015

    Advanced Firewall Protection for Global MPLS Network

    MAUSER Group has been in business for 118 years as a manufacturer of industrial packaging products for the chemical and petrochemical, pharmaceutical, and food and beverage industries. In today's connected world, data security has become a critical factor in helping the company maintain its industry leadership and customer loyalty. Data...

    Provided By McAfee

  • Case Studies // Jan 2015

    Global Retailer Secures Virtual Business Infrastructure with McAfee MOVE AntiVirus

    Global membership-style warehouse retailer has made virtualization of its IT infrastructure a top priority. Their challenge is to protect virtualized enterprise without hampering business. They chose McAfee to overcome this challenge. They have implemented management for optimized virtual environments AntiVirus, host intrusion prevention for desktop, VirusScan enterprise, endpoint encryption and...

    Provided By McAfee

  • Case Studies // Dec 2014

    Intel Security Upgrades Its Network Security with McAfee Next Generation Firewall

    Intel Security World's leading dedicated security vendor. McAfee, a part of Intel Security, is devoted to empowering businesses, service providers, the public sector and home users to safely experience the benefits of the Internet. Their challenge is to install latest next-generation firewalls to block advanced threats. They chose McAfee to...

    Provided By McAfee

  • Case Studies // Dec 2014

    TTUHSC Reliance on McAfee to Connect Security and Compliance

    Texas Tech University Health Sciences Center (TTUHSC) is a leading teaching and research university located in Texas. Their challenges are to improve security management and situational awareness, HIPAA and Texas Administrative Code TAC 202 compliance and replace legacy and under-performing, third party network, web and email solutions. They chose McAfee...

    Provided By McAfee

  • Case Studies // Dec 2014

    Leading Hosted IT Provider Drives Growing MSP Business with Security Connected

    Macquarie Telecom provides end-to-end hosting and communications for the delivery of corporate communications and applications. Their challenge is to evolve security services to ensure clients have maximum protection in an evolving threat landscape. They chose McAfee to overcome this challenge. They have implemented MSP program, ePolicy orchestrator (McAfee ePO), VirusScan...

    Provided By McAfee

  • Case Studies // Dec 2014

    Carglass Secures an Expanding Network with McAfee Next Generation Firewall

    Carglass is a subsidiary of Belron, a leading vehicle glass repair and replacement company operating in more than 35 countries around the world. Their challenge is to support mobile business initiative with unified and efficient solution for performance, security and network administration. They chose McAfee to overcome this challenge. They...

    Provided By McAfee

  • Case Studies // Dec 2014

    Security Connected Framework: Driving Compliance and Protecting 24,000 Endpoints

    Sutherland Global Services is an international provider of Business Process Outsourcing (BPO) and technology management services. Their challenge is to protect sensitive data and ensure cost-effective compliance with PCI and HIPAA. They chose McAfee to overcome this challenge. They have implemented ePolicy Orchestrator (McAfee ePO) software, endpoint protection advanced, host...

    Provided By McAfee

  • Case Studies // Dec 2014

    McAfee Enterprise Security Manager Delivers Managed Security Services for the Provincial Government of New Brunswick

    The Government of New Brunswick (GNB) administers 33 departments and agencies providing the full range of government services. Their challenges are to manual, decentralized security incident response, lacking consolidated, correlated event management and scale out managed security services across 33 departments. They chose McAfee to overcome these challenges. They have...

    Provided By McAfee

  • Case Studies // Nov 2014

    Bank Central Asia Achieves Compliance and Saves Time with McAfee ePO Software

    Bank Central Asia (BCA) is a publicly owned Indonesian bank. Their challenge is to protect network, systems and data and comply with industry and internal regulations. They chose McAfee to overcome this challenge. They have implemented ePO software, endpoint protection suite, network security platform, enterprise mobility management and vulnerability manager....

    Provided By McAfee

  • White Papers // Oct 2014

    Demand More

    Your adoption of NGFWs should bring a substantial increase in the range of protections and controls you can apply to your network. Basic NGFW features such as crude application control provide a starting point for your checklist. However, basic features are just the beginning. You can demand other valuable features.......

    Provided By McAfee

  • White Papers // Oct 2014

    Eight Must-Have Features for Ultimate Network Security Resource Optimization

    The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your...

    Provided By McAfee

  • White Papers // Oct 2014

    The Security Industry’s Dirty Little Secret

    One of hackers’ dirty little secret weapons used to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community where they are well known and have been in widespread use for several years there are...

    Provided By McAfee

  • Case Studies // Oct 2014

    Security Connected Strategy Supports Growing and Evolving Business

    Eagle Rock Energy Partners is an energy company focused on upstream activities, including oil and gas drilling, production and development. Their challenge is to build a security infrastructure to meet requirements for midstream as well as upstream businesses in a SCADA environment. They chose McAfee to overcome this challenge. They...

    Provided By McAfee

  • Case Studies // Jun 2014

    Fusion Turns to McAfee Next Generation Firewall for Comprehensive Network Security

    Provides Ethernet connectivity, virtualized IT services and managed solutions for the UK and European businesses. Their challenge is to protect customer data on the cloud. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall to protect against Advanced Evasion Techniques (AETs). The results of implementing...

    Provided By McAfee

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • Case Studies // Feb 2014

    SF Police Credit Union Passes Audits Easily with Comprehensive Security Management

    The San Francisco Police Credit Union (SFPCU) provides a wide range of financial services to first responders. Their challenges are to comply with Gramm-Leach-Bliley Act (GLBA) financial privacy regulations and National Credit Union Association (NCUA) guidelines, including Part 748 guidelines for safeguarding and preventing unauthorized access to member information. They...

    Provided By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • Case Studies // Feb 2014

    RWTH Secures Infrastructure and Data with McAfee Next Generation Firewall

    RWTH Aachen is the technical university of the Rhineland-Westphalian city of Aachen in northwest Germany. Their challenge is to protect network from malware attacks while ensuring high performance and availability. They chose McAfee to overcome this challenge. They have implemented McAfee next generation firewall automatically distributes RWTH's incoming and outgoing...

    Provided By McAfee

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • Case Studies // Jan 2014

    Cloud and Compliance In One Thanks to McAfee Enterprise Security Manager

    As a system integrator, DTS Systeme GmbH has supported customers for 30 years in operations related to IT environments. Their challenges are to compliance, reduction of administrative compliance tasks and integration of security and compliance into the cloud environment with a SIEM solution. They chose McAfee to overcome these challenges....

    Provided By McAfee

  • White Papers // Nov 2013

    What's Holding Back the Cloud?

    This Peer Research Report captures key findings from a survey of 800 IT professionals and provides insight into cloud computing security concerns, and how those concerns might be alleviated. Use it to better understand: Specific issues IT professionals have about cloud security, and how they differ between public cloud...

    Provided By McAfee

  • White Papers // Nov 2013

    Securing your evolving datacenter

    Your datacenter is evolving - your datacenter security should be evolving too. Key security technologies and services - most of which are already very familiar from their traditional use in a physical, on-premise context - are being adapted by leading solution providers to work across a broad range of physical...

    Provided By McAfee

  • White Papers // Nov 2013

    Next Generation Datacenter Security

    With 69% of APAC companies planning to adopt a hybrid cloud deployment model you need to read this SANS report and discover why a layered security approach for your virtual infrastructure needs to be a priority.

    Provided By McAfee

  • White Papers // Nov 2013

    Five Questions for the Next-Generation Data Center Security Architect

    The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively. They will require a new generation of security architectures that are equally flexible and scalable. This McAfee Solution Brief examines the challenges developments in server, storage and network...

    Provided By McAfee

  • Case Studies // Oct 2013

    Consolidating on McAfee Saves the State of Alaska $3.8 Million

    Alaska is the largest US state in area and larger than 18 sovereign countries. Their challenges are to efficiently and effectively secure citizen data across data centers, endpoints, and networks for 16 state agencies as well as rural citizens - all while cutting security costs and managing future cost projections....

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Enterprise Mobility Management Solution Brief

    How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?

    Provided By McAfee

  • White Papers // Aug 2013

    NSS Labs - Comparative Analysis Exploit Protection

    NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. See the results and analysis...

    Provided By McAfee

  • White Papers // Aug 2009

    Top Virtualization Security Mistakes (and How to Avoid Them)

    The usage of virtualization in cloud computing services is another trend that bears watching. From a security operations standpoint, there are new wrinkles introduced by these scenarios. One example is patch management responsibility. In a Platform- or Infrastructure-as-a-Service cloud scenario, responsibilities for patching operating systems and applications for virtual servers...

    Provided By McAfee

  • White Papers // Apr 2010

    Increasing Security and Compliance With End-to-End System Monitoring and Management

    McAfee, the world's largest dedicated security technology company, and ArcSight, the market leader in the Security Information and Event Management (SIEM) industry, have created a joint solution to shorten the amount of time between detection of a security incident and when a response can be made. Through its participation in...

    Provided By McAfee

  • White Papers // Jun 2010

    McAfee Removable Media Security Strong Data Security That Supports Mobility and Productivity

    An increasingly mobile workforce requires ready access to the company information they need to stay productive, regardless of where or how they work. Portability of both access and data is critical to day-to-day operations, but this convenience brings increased risk to the company's most sensitive information assets, such as intellectual...

    Provided By McAfee

  • White Papers // Oct 2009

    Cloud Computing: Risks and Rewards

    A key development in the evolution to cloud computing has been the virtualization of server infrastructure. Moving this virtualization to "The Cloud," third-party service providers can virtualize resources for multiple tenants across an entire infrastructure. As it has for enterprises, virtualization enables service providers to maximize the efficiency of large...

    Provided By McAfee

  • White Papers // Feb 2009

    How Virtualization Affects PCI DSS Part 2: A Review of the Top 5 Issues

    Achieving Payment Card Industry (PCI) compliance in a virtualized environment is very much attainable. It simply requires one to understand the intent of each of the requirements and how these are impacted by virtualization. As one goes through this process it will quickly find, in most organizations, that each of...

    Provided By McAfee

  • White Papers // Jun 2008

    Dashboard and Reporting for IT GRC: McAfee Risk and Compliance Manager

    McAfee Risk and Compliance Manager offers a solution that addresses assessment, policy, internal controls, reporting, remediation, continuous auditing, and third-party reviews. It is a network-based solution that can also use agent-based solutions as well. The Risk and Compliance Manager requires no additional software or hardware changes to the infrastructure. A...

    Provided By McAfee

  • White Papers // Dec 2009

    2010 Threat Predictions

    During the last six years, botnets have become the biggest thorn in the side of cybersecurity professionals. Botnets have become the essential infrastructure used by cybercriminals and nation-states for launching nearly every type of cyberattack: from data exfiltration and espionage to spam and distributed denial of service. By using an...

    Provided By McAfee

  • Webcasts // Jan 2009

    Hacking Exposed Webinar

    The presenter of this webcast outlines the state of hacking as it exists today. He also profiled three contemporary hacks with associated countermeasures. The hacks profiled include hacking the web: Cross-Site Request Forgery, Hacking SSL: SSLstripe, Hacking the Phone: What happens when the root access "feature".

    Provided By McAfee

  • White Papers // Apr 2009

    Financial Fraud and Internet Banking: Threats and Countermeasures

    To reach the gullible as well as the experienced, cybercriminals are developing new attack methods and new traps. One example is clickjacking. Also known as UI redress attack, this web-related structural weakness can fool users when they view a web page made of two layers. While users believe they are...

    Provided By McAfee

  • White Papers // Mar 2010

    Protecting Your Critical Assets: Lessons Learned From "Operation Aurora"

    As Operation Aurora highlighted, Advanced Persistent Threats (APT) are an increasingly common form of complex and directed attacks that use insidious techniques for gaining access to privileged systems and maintaining that access until all of the attackers' goals and objectives have been met. Operation Aurora employed an APT technique that...

    Provided By McAfee

  • White Papers // Nov 2009

    VoIP Vulnerabilities

    Voice over Internet Protocol (VoIP) is a method for making phone calls over the Internet or using private networks. Traditional phone calls must travel over a series of switches and circuits owned by the telephone companies, which control the process and the charges. By using VoIP, both businesses and individuals...

    Provided By McAfee

  • White Papers // Apr 2010

    Tough Times. Tough Choices: Security-as-a-Service Is the Right Choice, Right Now

    Today, every business is feeling the impact of the lagging economy, looking for opportunities to defer costs, cut corners, and eke out more value with every dollar spent. Faced with tough budget tradeoffs, businesses are even scrutinizing their security for cost savings. Whether one is an IT manager, an IT...

    Provided By McAfee

  • White Papers // Jan 2010

    An Introduction to Computer Viruses (and Other Destructive Programs)

    A virus is a computer program that executes when an infected program is executed. Therefore only executable files can be infected. On MS-DOS systems, these files usually have the extensions .EXE, .COM, .BAT or .SYS. Another class of files called overlay files can also be infected. These files often have...

    Provided By McAfee

  • White Papers // Jan 2010

    Social Networking Apps Pose Surprising Security Challenges

    Like any other Internet technology, social networking needs to have security built in from the beginning. The later security is bolted on to a service, the more costly it will be. As social networking applications continue to evolve, new security challenges will arise. Meanwhile, privacy will decrease as apps request...

    Provided By McAfee

  • White Papers // Nov 2009

    Insecure Trends in Web Technologies: A Review of Insecure Implementations of Rich Internet Applications

    This paper discusses various security risks associated with social networks and the insecure implementations of major web technologies Ajax, Flash and Silverlight. As a specific case study it presents an analysis of Microsoft Silverlight from a security stand point. In this context it discusses how a malicious user could use...

    Provided By McAfee

  • White Papers // Nov 2009

    Mobile Application Security Testing

    The consumer mobile application market has seen explosive growth in the last couple of years. These applications have provided convenient access to bank accounts, credit card data, Personally Identifiable Information (PII), travel itineraries and personal emails to name a few. The enterprise mobile applications extend corporate networks beyond the perimeter...

    Provided By McAfee

  • White Papers // Aug 2011

    Hone Your Web 2.0 Strategy

    Understand the opportunities and challenges of enabling users to share information on cloud applications. Learn Web 2.0 security best practices from experts and decision makers worldwide.

    Provided By McAfee

  • White Papers // Jul 2012

    Assessing vulnerabilities (German)

    Take the stress out of "keeping up" with the torrent of vulnerabilities with greater dynamic visibility. New vulnerabilities are disclosed by Microsoft, Adobe, and other vendors on an almost daily basis and keeping up with and cataloguing newly added servers, devices and applications to support the business is tough. Add...

    Provided By McAfee

  • White Papers // Jan 2013

    Hardening database security and compliance without sacrificing availability or performance

    McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

    Provided By McAfee

  • White Papers // Dec 2012

    Not all database security solutions are created equal. Compare solutions from different vendors.

    Databases are the number one target of cybercriminals and disgruntled insiders. Traditional perimeter and network security, as well as built-in database security measures, offer only limited protection when it comes to securing the organization’s most sensitive data. That’s why compliance officers as well as auditors are taking a much closer...

    Provided By McAfee

  • White Papers // Dec 2012

    HIPAA/HITECH Compliance for Databases: Comply fully and reduce database security risk

    HIPAA and HITECH require all individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren’t prescriptive when it comes to what needs to be done about computer systems. In most cases, they don’t specify how to secure PHI; they...

    Provided By McAfee

  • White Papers // Dec 2012

    PCI DSS Compliance for Databases: Comply fully and reduce database security risk

    Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest. Anyone who processes, stores, or transmits credit card information must comply with PCI DSS by...

    Provided By McAfee

  • White Papers // Apr 2013

    Technology and approach for providing real-time, comprehensive protection for all types of databases.

    Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasure. The most effective way to protect any database is with effective multilayered database protection. Compliance officers and regulators know...

    Provided By McAfee

  • White Papers // Dec 2012

    McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention

    Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It is good common sense to secure databases as well as or better than other systems in the enterprise. But it’s not that simple. In this white paper, we take a look at...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Security

    A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Database Security: Real time protection for business-critical databases without downtime

    Poorly protected databases are a cybercriminal’s dream come true. They contain your company’s most valuable, easily exploitable data—all nicely packaged in convenient locations. It’s understandable why databases are the leading target of sophisticated cyberattacks by hackers and are increasingly exploited by privileged users inside of organizations. However, there’s plenty you...

    Provided By McAfee

  • White Papers // Dec 2010

    McAfee Database Activity Monitoring: Cost-effective protection to meet your compliance requirements

    Organizations store their most valuable and sensitive data in a database, but perimeter protection and basic security provided with the database don’t protect you from today’s sophisticated hackers or potential threats from rogue insiders. Research shows that more than 92 percent of records breached involved a database, with more than...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Vulnerability Manager for Databases: Comprehensive assessment of risk to your sensitive data

    You store your most valuable and sensitive data in a database, but most vulnerability assessment products don’t know enough about database systems to thoroughly test them, putting your data at risk. Practically every week there’s yet another announcement of a major data breach. McAfee® Vulnerability Manager for Databases automatically discovers...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches

    Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patches have been released by database management system (DBMS) providers, placing that sensitive data at risk. McAfee® Virtual Patching for...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Compliance

    Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in many forms—business disruption, bad publicity, stiff fines for noncompliance, and undermined confidence with the existing base of customers,...

    Provided By McAfee

  • White Papers // Apr 2013

    Database Security in Virtualization and Cloud Computing Environments

    Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable.By deploying memory-based solutions for distributed database monitoring, enterprises will...

    Provided By McAfee

  • White Papers // Apr 2013

    Overcoming the Challenges of Database Patching in Production Environments

    The frequency and sophistication of attacks shows no signs of declining; and today’s economic climate does not allow for more resources to be applied to the challenging task of testing and applying physical patches promptly upon their release. Combined with the compliance framework of SOX, HIPAA, PCI DSS, and the...

    Provided By McAfee

  • White Papers // Jun 2009

    The Rise of AutoRun- Based Malware

    Most people associate today's computer viruses and other prevalent malware with the Internet. But that's not where they started. Lest the authors forget, the earliest computer threats came from the era of floppy disks and removable media. With the arrival of the Internet, email and network-based attacks became the preferred...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee