Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Jul 2008

    Securing Virtual Worlds Against Real Attacks: The Challenges of Online Game Development

    Most of the attacks that have been witnessed in real life will surface in virtual worlds unless the environment is built with security in mind. It needs to leverage knowledge and work together - security vendors and gaming vendors - to avoid falling into the same trap again. It is...

    Provided By McAfee

  • White Papers // Jan 2009

    McAfee Web Security Service

    Most security efforts lose effectiveness over time. Any changes in the web server, web applications, or other infrastructure configuration, can unintentionally open the door to security hazards. With so many new threats identified each day, one needs to continually test the security measures and decide which risks are the most...

    Provided By McAfee

  • White Papers // Mar 2009

    The Carbon Footprint of Email Spam Report

    All email users throughout the world, including consumers and businesses, struggle with the scourge of spam email. The costs and risks associated with spam have been well documented and have led to attempts by both government and private industry to curtail spam, notably the United States legislature's CAN-SPAM Act of...

    Provided By McAfee

  • White Papers // Jan 2009

    2009 Threat Predictions: Slumping Economy Drives Malware Threats

    Malware is a business, and that business is thriving. Gone are the days of virus writing for notoriety. More than 90 percent of the malware written today consists of password-stealing Trojans and downloaders with one goal in mind: to find valuable data. The shift in threats from virus writing to...

    Provided By McAfee

  • Case Studies // Jul 2012

    McAfee SECURE Service Converts Highly Skeptical E-Commerce CEO

    FootageFirm is the leading provider of royalty-free high quality stock video footage from around the world. Their challenge is when building the VideoBlocks website, Holland started with a clean slate. With what they calls a 'Test and run, test and optimize' mindset, they set out to create an online destination...

    Provided By McAfee

  • Case Studies // Oct 2011

    Foreclosures.com Locks in Higher Sales with McAfee SECURETM Service

    Foreclosures have been helping individuals navigate the real estate world. Their challenge is to replace a separate PCI Approved Scan Vendor (ASV) with a bundled service including PCI, vulnerability and web application security scanning, in addition to a site security trustmark. They chose McAfee to overcome this challenge. They implemented...

    Provided By McAfee

  • Case Studies // Oct 2011

    B2B Retailer ID's McAfee SECURE Service as Path to Higher Sales

    A B2B supplier of ID equipment and supplies, the company provides the security and marketing industries with equipment. Their challenge is the ID card market is a highly competitive vertical and online sales an increasingly important channel and traffic is driven through a combination of paid and organic search activity...

    Provided By McAfee

  • Case Studies // Oct 2011

    Pamela for Skype and Pamfax Use Mcafee Secure Trustmark to Message Security

    Pamela for Skype was created to provide enhanced functionality - like voice mail - that was missing from the earliest versions of Skype. Their challenge is awareness of security grows; people are developing real concerns about faxing communication security. Security concerns are one of the reasons why faxing remains a...

    Provided By McAfee

  • White Papers // Aug 2011

    Hone Your Web 2.0 Strategy

    Understand the opportunities and challenges of enabling users to share information on cloud applications. Learn Web 2.0 security best practices from experts and decision makers worldwide.

    Provided By McAfee

  • White Papers // Jul 2008

    Does Size Matter? The security challenge of the SMB

    Just because a business is small, doesn't mean it's immune to security threats. Security challenges facing Small and Medium Businesses in North America are on the rise. For businesses of all sizes, viruses, hacker intrusions, spyware and spam can lead to lost or stolen data, computer downtime, decreased productivity, compliance...

    Provided By McAfee

  • White Papers // Jul 2008

    Enabling Your Mobile Workforce without Putting Your Data at Risk

    As the global workforce becomes increasingly mobile, it's more important than ever to prevent that workforce from becoming a liability to your organization. If just one employee loses a laptop, USB drive, or handheld device or uses sensitive data in unintended ways, your entire company could risk a highly public...

    Provided By McAfee

  • White Papers // May 2008

    Proving Compliance with McAfee Total Protection for Data

    Companies feel a sense of security from encrypting data stored on corporate systems − on desktops, laptops and mobile devices. They believe this act will protect their intellectual property, and sensitive customer information will remain safe and secure from unauthorized access. But that is not enough. Simply encrypting this information...

    Provided By McAfee

  • White Papers // May 2008

    Understanding Today's Privacy Regulations

    As the amount of personal information gathered and electronically stored increases, so does the concern about protecting it. Data Security, Data Protection and Data Breach Laws and Regulations...what does it all mean? Download this paper to learn about different privacy regulations around the world, and how personal information can be...

    Provided By McAfee

  • White Papers // Jul 2008

    Smart, Simple, Secure Management Options for Small to Medium Enterprises

    Small to medium enterprises (SME) face the same threats and require the same security protections that large enterprises demand. Yet resource constraints make it essential for firms of this size to have solution options that deliver maximum security for every dollar invested. By offering comprehensive protection and centralized management, a...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Enterprise Mobility Management Solution Brief

    How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints, and employee-owned mobile devices) from the same unified management infrastructure in a simplified, secure, scalable way?

    Provided By McAfee

  • White Papers // Aug 2013

    NSS Labs - Comparative Analysis Exploit Protection

    NSS tested 11 popular enterprise EPP products to measure their effectiveness in protecting Windows computers against exploits. The results of the in-depth testing of 41 individual exploits and over 200 attack scenarios revealed significant differences in the defensive capabilities of 11 leading endpoint protection solutions. See the results and analysis...

    Provided By McAfee

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee

  • White Papers // Aug 2013

    How to Protect your business from Hackers

    Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

    Provided By McAfee

  • White Papers // Aug 2013

    McAfee Cloud-Based Security for SMBs

    Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

    Provided By McAfee

  • White Papers // Aug 2013

    5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

    Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

    Provided By McAfee

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Provided By McAfee

  • White Papers // Jun 2009

    The Rise of AutoRun- Based Malware

    Most people associate today's computer viruses and other prevalent malware with the Internet. But that's not where they started. Lest the authors forget, the earliest computer threats came from the era of floppy disks and removable media. With the arrival of the Internet, email and network-based attacks became the preferred...

    Provided By McAfee

  • White Papers // Nov 2013

    Next Generation Datacenter Security

    With 69% of APAC companies planning to adopt a hybrid cloud deployment model you need to read this SANS report and discover why a layered security approach for your virtual infrastructure needs to be a priority.

    Provided By McAfee

  • White Papers // Nov 2013

    Five Questions for the Next-Generation Data Center Security Architect

    The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively. They will require a new generation of security architectures that are equally flexible and scalable. This McAfee Solution Brief examines the challenges developments in server, storage and network...

    Provided By McAfee

  • White Papers // Nov 2011

    Android Malware Past, Present, and Future

    At the end of 2010, a new Android malware dubbed \"Geinimi\" was discovered and classified as \"The most sophisticated Android malware the authors have seen to date.\" The announcement quickly made headlines and raised concerns about what other Android malware has been seen thus far, what the current risk for...

    Provided By McAfee

  • White Papers // Dec 2012

    PCI DSS Compliance for Databases: Comply fully and reduce database security risk

    Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest. Anyone who processes, stores, or transmits credit card information must comply with PCI DSS by...

    Provided By McAfee

  • White Papers // Apr 2013

    Technology and approach for providing real-time, comprehensive protection for all types of databases.

    Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasure. The most effective way to protect any database is with effective multilayered database protection. Compliance officers and regulators know...

    Provided By McAfee

  • White Papers // Dec 2012

    McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention

    Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It is good common sense to secure databases as well as or better than other systems in the enterprise. But it’s not that simple. In this white paper, we take a look at...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Security

    A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Database Security: Real time protection for business-critical databases without downtime

    Poorly protected databases are a cybercriminal’s dream come true. They contain your company’s most valuable, easily exploitable data—all nicely packaged in convenient locations. It’s understandable why databases are the leading target of sophisticated cyberattacks by hackers and are increasingly exploited by privileged users inside of organizations. However, there’s plenty you...

    Provided By McAfee

  • White Papers // Dec 2010

    McAfee Database Activity Monitoring: Cost-effective protection to meet your compliance requirements

    Organizations store their most valuable and sensitive data in a database, but perimeter protection and basic security provided with the database don’t protect you from today’s sophisticated hackers or potential threats from rogue insiders. Research shows that more than 92 percent of records breached involved a database, with more than...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Vulnerability Manager for Databases: Comprehensive assessment of risk to your sensitive data

    You store your most valuable and sensitive data in a database, but most vulnerability assessment products don’t know enough about database systems to thoroughly test them, putting your data at risk. Practically every week there’s yet another announcement of a major data breach. McAfee® Vulnerability Manager for Databases automatically discovers...

    Provided By McAfee

  • White Papers // Apr 2013

    McAfee Virtual Patching for Databases: Easy-to-apply protection from potential database breaches

    Organizations store their most valuable and sensitive data in their enterprise database, yet a large number of organizations do not engage in the timely installation of vendor patches after those patches have been released by database management system (DBMS) providers, placing that sensitive data at risk. McAfee® Virtual Patching for...

    Provided By McAfee

  • White Papers // Apr 2013

    A Practical Guide to Database Compliance

    Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in many forms—business disruption, bad publicity, stiff fines for noncompliance, and undermined confidence with the existing base of customers,...

    Provided By McAfee

  • White Papers // Apr 2013

    Database Security in Virtualization and Cloud Computing Environments

    Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable.By deploying memory-based solutions for distributed database monitoring, enterprises will...

    Provided By McAfee

  • White Papers // Jan 2009

    Access Protection in McAfee VirusScan Enterprise and Host Intrusion Prevention

    Securing networks against a wide range of threats - viruses, spyware, worms, rootkits, and Trojans - is more challenging than ever. Whether it's a global enterprise or a small or medium-sized business that has a full-time security staff, VSE ensures that endpoint servers, desktops, and laptops remain malware free. VSE...

    Provided By McAfee

  • White Papers // Oct 2008

    The Changing Face of Vulnerabilities

    Although social engineering does not play a role in all forms of security threats, McAfee Avert Labs has observed a growing trend recently: malware writers using social engineering to exploit software vulnerabilities. With the recent trends in vulnerabilities, social engineering is a force that is difficult to combat. No matter...

    Provided By McAfee