McAfee

Displaying 1-40 of 148 results

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Sponsored By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Feb 2014

    Infographic: The 4 Phases of a Cyber Attack

    How cyber criminals are targeting SMBs, understanding the way an attack behaves will help you stay safe from cyber crime. Download this infographic now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Nov 2013

    What's Holding Back the Cloud?

    This Peer Research Report captures key findings from a survey of 800 IT professionals and provides insight into cloud computing security concerns, and how those concerns might be alleviated. Use it to better understand: Specific issues IT professionals have about cloud security, and how they differ between public cloud...

    Provided By McAfee

  • White Papers // Nov 2013

    Five Questions for the Next-Generation Data Center Security Architect

    The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively. They will require a new generation of security architectures that are equally flexible and scalable. This McAfee Solution Brief examines the challenges developments in server, storage and network...

    Provided By McAfee

  • White Papers // Nov 2013

    Next Generation Datacenter Security

    With 69% of APAC companies planning to adopt a hybrid cloud deployment model you need to read this SANS report and discover why a layered security approach for your virtual infrastructure needs to be a priority.

    Provided By McAfee

  • White Papers // Nov 2013

    Securing your evolving datacenter

    Your datacenter is evolving - your datacenter security should be evolving too. Key security technologies and services - most of which are already very familiar from their traditional use in a physical, on-premise context - are being adapted by leading solution providers to work across a broad range of physical...

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • Case Studies // Aug 2013

    Endpoint Protection. Independent Reports name the market leaders.

    The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.This Magic Quadrant takes an extensive look at the strengths and cautions of...

    Provided By McAfee

  • White Papers // Aug 2013

    Freeform Dynamics Report - The End User Security Jigsaw

    Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts. A global study of 977 IT and business professionals provided...

    Provided By McAfee

  • White Papers // Aug 2013

    SANS Survey on Mobility/BYOD Security Policies and Practices

    In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet, 38% do not have the policies they feel are necessary.Learn why you need to implement stronger...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Enterprise Mobility Management Solution Brief

    How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?

    Provided By McAfee

  • White Papers // Aug 2013

    NSS Labs - Comparative Analysis Exploit Protection

    NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. See the results and analysis...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Vulnerability Manager for Databases: Comprehensive assessment of risk to your sensitive data

    You store your most valuable and sensitive data in a database, but most vulnerability assessment products don’t know enough about database systems to thoroughly test them, putting your data at risk. Practically every week there’s yet another announcement of a major data breach. McAfee® Vulnerability Manager for Databases automatically discovers...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Database Security: Real time protection for business-critical databases without downtime

    Poorly protected databases are a cybercriminal’s dream come true. They contain your company’s most valuable, easily exploitable data—all nicely packaged in convenient locations. It’s understandable why databases are the leading target of sophisticated cyberattacks by hackers and are increasingly exploited by privileged users inside of organizations. However, there’s plenty you...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Security

    A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for...

    Provided By McAfee

  • White Papers // Apr 2013

    Technology and approach for providing real-time, comprehensive protection for all types of databases.

    Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasure. The most effective way to protect any database is with effective multilayered database protection. Compliance officers and regulators know...

    Provided By McAfee

  • White Papers // Apr 2013

    Overcoming the Challenges of Database Patching in Production Environments

    The frequency and sophistication of attacks shows no signs of declining; and today’s economic climate does not allow for more resources to be applied to the challenging task of testing and applying physical patches promptly upon their release. Combined with the compliance framework of SOX, HIPAA, PCI DSS, and the...

    Provided By McAfee

  • White Papers // Apr 2013

    Database Security in Virtualization and Cloud Computing Environments

    Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable.By deploying memory-based solutions for distributed database monitoring, enterprises will...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Compliance

    Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in many forms—business disruption, bad publicity, stiff fines for noncompliance, and undermined confidence with the existing base of customers,...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches

    Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patches have been released by database management system (DBMS) providers, placing that sensitive data at risk. McAfee® Virtual Patching for...

    Provided By McAfee

  • White Papers // Jan 2013

    Top Five Reasons to Deploy a Dedicated Database Security Solution

    This McAfee whitepaper highlights the top 5 reasons why protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, not to mention ensuring regulatory compliance. Further to this, these reasons highlight how many organizations still rely on security solutions...

    Provided By McAfee

  • White Papers // Jan 2013

    Hardening database security and compliance without sacrificing availability or performance

    McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

    Provided By McAfee

  • White Papers // Dec 2012

    McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention

    Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It is good common sense to secure databases as well as or better than other systems in the enterprise. But it’s not that simple. In this white paper, we take a look at...

    Provided By McAfee

  • White Papers // Dec 2012

    PCI DSS Compliance for Databases: Comply fully and reduce database security risk

    Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest. Anyone who processes, stores, or transmits credit card information must comply with PCI DSS by...

    Provided By McAfee

  • White Papers // Dec 2012

    HIPAA/HITECH Compliance for Databases: Comply fully and reduce database security risk

    HIPAA and HITECH require all individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren’t prescriptive when it comes to what needs to be done about computer systems. In most cases, they don’t specify how to secure PHI; they...

    Provided By McAfee

  • White Papers // Dec 2012

    Not all database security solutions are created equal. Compare solutions from different vendors.

    Databases are the number one target of cybercriminals and disgruntled insiders. Traditional perimeter and network security, as well as built-in database security measures, offer only limited protection when it comes to securing the organization’s most sensitive data. That’s why compliance officers as well as auditors are taking a much closer...

    Provided By McAfee

  • White Papers // Aug 2012

    Securing and controlling laptops

    This technical brief explores the need for remote devices carry confidential data on the front line, which is far from the defences layered into the corporate network. It explores the driving concerns around mobile devices and laptops in particular being be more vulnerable to evolving attacks and susceptible to loss,...

    Provided By McAfee

  • White Papers // Aug 2012

    The evolving landscape of desktop security

    The desktop security landscape has been evolving due to multiple factors, including targeted malware, end-user convenience concerns, and IT support and operations costs. This solution brief explains about why the traditional way of implementing desktop security -- akin to buying an insurance policy against possible risks with no significant consideration...

    Provided By McAfee

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Sponsored By McAfee

  • White Papers // Jul 2012

    Risk and compliance outlook 2012

    Avoid check-box compliance and fire drill responses to security in favor of sustained, continuous and actionable risk management programs that address IT security as a business risk. This global study highlights how IT decision-makers view and address the challenges of risk and compliance management in a highly regulated and increasingly...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Security

    A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for...

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Jul 2012

    Security Management 2.0: Time to Replace Your SIEM?

    This white paper from Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate - if the benefits outweigh the risks. This paper details: Platform evolution and requirements Selection and decision...

    Provided By McAfee

  • White Papers // Jan 2009

    McAfee Web Security Service

    Most security efforts lose effectiveness over time. Any changes in the web server, web applications, or other infrastructure configuration, can unintentionally open the door to security hazards. With so many new threats identified each day, one needs to continually test the security measures and decide which risks are the most...

    Provided By McAfee

  • White Papers // Dec 2012

    McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention

    Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It is good common sense to secure databases as well as or better than other systems in the enterprise. But it’s not that simple. In this white paper, we take a look at...

    Provided By McAfee

  • Case Studies // Apr 2009

    Hawaii Pacific Health Selects McAfee to Stop Inbound and Outbound Email Threats

    Hawaii Pacific Health (HPH) is the second largest private employer in Hawaii. Email is a vital communication tool outbound and within the organization. They wanted users and the network must be protected from spam and viruses. They choose Hawaii Pacific Health relies on McAfee Email Gateway and McAfee Email Encryption,...

    Provided By McAfee

  • White Papers // Apr 2013

    Technology and approach for providing real-time, comprehensive protection for all types of databases.

    Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasure. The most effective way to protect any database is with effective multilayered database protection. Compliance officers and regulators know...

    Provided By McAfee

  • White Papers // Dec 2012

    PCI DSS Compliance for Databases: Comply fully and reduce database security risk

    Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest. Anyone who processes, stores, or transmits credit card information must comply with PCI DSS by...

    Provided By McAfee

  • Case Studies // Mar 2009

    VGZ Secures Mobile Workstations With McAfee Endpoint Encryption

    VGZ is one of the largest health insurance companies in the Netherlands. They wanted to give the protection to customer and business data on all laptops in the organisation to comply with the Wet Bescherming Persoonsgegevens. (Personal Data Protection Act).Now they found McAfee Endpoint Encryption VGZ began by equipping 150...

    Provided By McAfee

  • White Papers // Dec 2012

    HIPAA/HITECH Compliance for Databases: Comply fully and reduce database security risk

    HIPAA and HITECH require all individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren’t prescriptive when it comes to what needs to be done about computer systems. In most cases, they don’t specify how to secure PHI; they...

    Provided By McAfee

  • Case Studies // Feb 2009

    McAfee Data Protection Slashes Risk of Data Leakage Across Investment Bank BOCI's Global Enterprise

    BOC International Holdings Limited (BOCI) is a wholly owned, Hong Kong-based subsidiary of the Bank of China with registered capital of US$1 billion. BOCI needed to mitigate the risk of leaking sensitive data from any of its systems. They choose McAfee Host Data Loss Prevention enables the implementation of data...

    Provided By McAfee

  • White Papers // Oct 2011

    Improve email security with a hybrid solution

    From appliances, software and virtualised environments, businesses have typically used on-premise solutions for their email security solutions. As departments cut costs, many businesses are finding a better option in security software-as-a-service (SaaS). However, a hybrid of the two could be attractive option for large organisations that need to outsource expenses,...

    Provided By McAfee

  • Case Studies // Jul 2009

    Ameresco Relies on UTM Firewall to Safeguard, Access, and Control Equipment and Data at Remote Plants

    Ameresco is the largest independent provider of energy optimization services and renewable energy plants in North America. The company wanted dispersed plant locations have no onsite IT support, requiring firewalls to be operated remotely. heavy equipment, which can be manipulated online, must be protected from tampering. VPN tunneling is critical...

    Provided By McAfee

  • Case Studies // Mar 2009

    McAfee Total Protection for Endpoint Secures Network for University of Adelaide

    The University of Adelaide is among Australia's leading universities, with a student enrollment of just over 20,000.The University must protect a large network that is critical to its educational and research objectives without impairing user productivity. The University is a long-time user of McAfee Vulnerability Manager. The University purchased McAfee...

    Provided By McAfee

  • White Papers // Apr 2013

    Overcoming the Challenges of Database Patching in Production Environments

    The frequency and sophistication of attacks shows no signs of declining; and today’s economic climate does not allow for more resources to be applied to the challenging task of testing and applying physical patches promptly upon their release. Combined with the compliance framework of SOX, HIPAA, PCI DSS, and the...

    Provided By McAfee

  • White Papers // Jan 2010

    An Introduction to Computer Viruses (and Other Destructive Programs)

    A virus is a computer program that executes when an infected program is executed. Therefore only executable files can be infected. On MS-DOS systems, these files usually have the extensions .EXE, .COM, .BAT or .SYS. Another class of files called overlay files can also be infected. These files often have...

    Provided By McAfee

  • White Papers // Apr 2013

    Database Security in Virtualization and Cloud Computing Environments

    Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable.By deploying memory-based solutions for distributed database monitoring, enterprises will...

    Provided By McAfee

  • White Papers // Apr 2010

    Tough Times. Tough Choices: Security-as-a-Service Is the Right Choice, Right Now

    Today, every business is feeling the impact of the lagging economy, looking for opportunities to defer costs, cut corners, and eke out more value with every dollar spent. Faced with tough budget tradeoffs, businesses are even scrutinizing their security for cost savings. Whether one is an IT manager, an IT...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Compliance

    Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in many forms—business disruption, bad publicity, stiff fines for noncompliance, and undermined confidence with the existing base of customers,...

    Provided By McAfee

  • Case Studies // Feb 2009

    Memorial Hermann Preemptively Guards Against Loss of Patient Data With McAfee Endpoint Encryption and Device Control

    Memorial Hermann Healthcare System, headquartered in Houston Texas, specializes in clinical patient-centered care using leading-edge technology. Memorial Hermann sought to proactively encrypt laptops, workstations and other transportable media devices to guard against possible data loss. Memorial Hermann installed McAfee Endpoint Encryption for Devices, McAfee Device Control, and McAfee ePolicy Orchestrator...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches

    Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patches have been released by database management system (DBMS) providers, placing that sensitive data at risk. McAfee® Virtual Patching for...

    Provided By McAfee

  • White Papers // Oct 2011

    Scaling security from, in and for the cloud

    The cloud isn't without its risks, says Scott Chasin, McAfee's chief technology officer, SaaS. Hackers have already taken notice of the interest and demand for cloud-based computing. Where there's information to be stolen, there's money to be made. As more and more information and applications migrate to the cloud, so...

    Provided By McAfee

  • Case Studies // May 2009

    McAfee Helps ARC Stay PCI-Compliant While Processing $80 Billion in Travel Expenditures Annually

    Airlines Reporting Corporation (ARC) provides financial services, data products and services, ticket distribution, original travel solutions, and settlement services to the travel industry. To comply with PCI, the company must prevent credit card information from leaking, either accidentally or maliciously. Now they installed Three McAfee Network DLP appliances who monitor...

    Provided By McAfee

  • Case Studies // Oct 2011

    B2B Retailer ID's McAfee SECURE Service as Path to Higher Sales

    A B2B supplier of ID equipment and supplies, the company provides the security and marketing industries with equipment. Their challenge is the ID card market is a highly competitive vertical and online sales an increasingly important channel and traffic is driven through a combination of paid and organic search activity...

    Provided By McAfee

  • Case Studies // Feb 2009

    McAfee Simplifies Worldwide IT and Security Standardization for Draka Holding

    Draka Holding N.V. is the sixth largest worldwide cable provider with around 10,000 employees across 80 sites in 29 countries. They wanted Global centralization of IT services forced Draka Holding to update its security solutions worldwide; limited IT staffs were burdened managing IT and security for 80 worldwide sites. Draka...

    Provided By McAfee

  • Case Studies // Oct 2011

    Pamela for Skype and Pamfax Use Mcafee Secure Trustmark to Message Security

    Pamela for Skype was created to provide enhanced functionality - like voice mail - that was missing from the earliest versions of Skype. Their challenge is awareness of security grows; people are developing real concerns about faxing communication security. Security concerns are one of the reasons why faxing remains a...

    Provided By McAfee

  • Case Studies // Nov 2009

    McAfee Total Protection for Secure Business Protects Spanish Government Agency With Minimal IT Resources

    Agencia de Defensa de la Competencia de Andaluc?a is an autonomous government organization tasked with protecting free trade in the province of Andaluc?a, Spain. With limited IT resources they want protection against security threats to systems, including via USB ports. They choose McAfee Total Protection for Secure Business. McAfee provides...

    Provided By McAfee

  • White Papers // Feb 2014

    10 Step Security Checklist Webinar for SMBs

    Watch this webinar replay to hear a step-by-step guide to keeping your business safe. You will gain an understanding of how to keep your company assets – data, devices, email and web – safe and secure, one step at a time.

    Provided By McAfee

  • White Papers // Oct 2011

    Malware 101: What CIOs should know

    What does a botnet do? Why was Stuxnet a benchmark for data theft? Why should CIOs care about attack strategies? To fend off these threats, enterprise defences will need to move out of the traditional software operating stack to monitor operations from a new vantage point closer to and integral...

    Provided By McAfee

  • White Papers // Apr 2010

    Increasing Security and Compliance With End-to-End System Monitoring and Management

    McAfee, the world's largest dedicated security technology company, and ArcSight, the market leader in the Security Information and Event Management (SIEM) industry, have created a joint solution to shorten the amount of time between detection of a security incident and when a response can be made. Through its participation in...

    Provided By McAfee

  • Case Studies // Mar 2009

    McAfee Network Security Platform Protects Bank Customers' Financial Assets and Personal Data

    Syndicate Bank, one of the top ten banks in India, provides businesses and individuals with commercial and retail banking services, including Internet banking. Syndicate Bank needed a way to safeguard bank and customer assets and information, as well as provide uninterrupted service for online banking. Syndicate Bank selected McAfee Network...

    Provided By McAfee

  • White Papers // Feb 2014

    The Cost of Free- A Cautionary Tale

    “Free” software, especially within a security context, can prove to be surprisingly costly. This whitepaper explores the risk to your organisation and data from “free” software and provides best practice solutions for SMB security. Download this white paper now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Jan 2013

    Hardening database security and compliance without sacrificing availability or performance

    McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

    Provided By McAfee

  • White Papers // Apr 2009

    STAMPing Out Email Risk: Seven Technologies for Advanced Mail Protection

    Email is today's primary medium of business communications. As such, it presents a rich target for hackers, spammers, and malware owners, and a vulnerability to careless or malicious insiders. Regulators have noted the importance of email in the enterprise, and have issued email-specific rules and regulations regarding privacy and intellectual...

    Provided By McAfee

  • White Papers // Feb 2014

    The top 5 endpoint security tips for SMBs

    The five endpoint security tips in this document represent a minimum viable set of practices and procedures to help you protect your business. Download these tips now to stay ahead of cyber crime.

    Provided By McAfee

  • White Papers // Dec 2012

    Not all database security solutions are created equal. Compare solutions from different vendors.

    Databases are the number one target of cybercriminals and disgruntled insiders. Traditional perimeter and network security, as well as built-in database security measures, offer only limited protection when it comes to securing the organization’s most sensitive data. That’s why compliance officers as well as auditors are taking a much closer...

    Provided By McAfee

  • White Papers // Jan 2009

    Access Protection in McAfee VirusScan Enterprise and Host Intrusion Prevention

    Securing networks against a wide range of threats - viruses, spyware, worms, rootkits, and Trojans - is more challenging than ever. Whether it's a global enterprise or a small or medium-sized business that has a full-time security staff, VSE ensures that endpoint servers, desktops, and laptops remain malware free. VSE...

    Provided By McAfee

  • White Papers // Jul 2012

    Enforcing Endpoint Compliance

    This technical brief looks at how to Police managed and unmanaged systems with Network Access Control (NAC). It explore the current situation and driving concerns such as when employees bring in their own laptops, tablets, and smartphones or a business unit decides to hire contractors and increasing support for remote...

    Provided By McAfee