Data Management: Data Loss Prevention (DLP)

Click for details

CISO's Investigate: User Behavior Analytics

Click for more details

Download…

Click for details

Definitive Guide to Security Intelligence and Analytics

Find and Stop Attacks Sooner to Prevent Data Breaches and Minimize Damage

Download…

Click for details

Online financial services firm ensures business continuity while slashing IT workload

Click for more details

Download…

Click for details

Choosing the Right Public Cloud for better Data Protection

Click for more details

Download…

Click for details

Active Directory: Sicherheit zur Bewältigung von Insiderbedrohungen

Click for more details

Download…

Click for details

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Click for more details

Download…

Security in Unison

Organizations face multiple security and operational challenges as they attempt to mount an effective defense against today’s emerging threats. Zero-day and advanced targeted attacks use payloads that have never been seen before. Polymorphic malware threats also pose similar challenges. On their own, traditional, signature-based countermeasures have difficulty detecting advanced malware payloads.

Download…

Click for details

Operationalizing Threat Intelligence

In a recent report, Forrester notes that 77% of North American and European enterprise security decision makers report that improving threat intelligence capabilities is a priority.2 Cyberthreat intelligence promises to give security practitioners advance warning of cybercriminals targeting their region, industry, or even specific firms so that they have time to take action, but IT security still faces some big challenges.

Download…

How to Protect Against Ransomware

Ransomware is malware that employs asymmetric encryption to hold a victim’s information at ransom. Asymmetric (public-private) encryption is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key to decrypt the files stored on the attacker’s server. The attacker makes the private key available to the victim only after the ransom is paid, though that is not always the case—as seen in recent ransomware campaigns. Without access to the private key, it is nearly impossible to decrypt the files that are being held for ransom.

Download…

Disrupt Targeted Attacks

Our Security Connected framework makes it easy to reduce complexity, response time, and operational costs while simultaneously improving your security posture in the face of growing risk. Hundreds of products and services from Intel Security and its partners share context and intelligence in real time to learn and adapt to keep your critical information and infrastructure safer. Standard interfaces bridge Intel Security innovations and end-to-end infrastructure to your environment. It’s the agile foundation of an adaptive security architecture.

Download…

Click for details

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee® Endpoint Security—part of the Intel® Security product offering—enables customers to respond to and manage the threat defense lifecycle and provides a collaborative, extensible framework to reduce the complexity of conventional multivendor endpoint security environments. It also protects productivity with fast, effective performance and visibility into advanced threats to speed detection and remediation response times. Global threat intelligence and real time local event intelligence are shared between endpoints to further aid in rapid detection and response while management is kept simple through a true centralized console and easy to read dashboards and reports. McAfee Endpoint Security is built for real-time communication between threat defenses. Events and threat insights are shared with multiple technologies to take immediate actions against suspicious applications, downloads, websites, and files. Redundancies can be found and removed while multiple defenses are united on a common endpoint architecture that is built with the future in mind.

Download…

Monitor Continuously. Respond Swiftly.

Every day last year, 2,803,036 data records were lost or stolen as a result of a data breach—and research indicates that the numbers are climbing at an alarming rate. Data breaches totaled 1,540 last year, up 46% from the previous year.1 Most security-conscious organizations are quickly coming to the realization that traditional set-and-forget endpoint solutions are illequipped to handle the daily barrage of zero-day and advanced targeted attacks (ATAs). Security teams need uninterrupted visibility into endpoint activity, rather than just alerts from security products after something has already gone wrong. Endpoint detection and response (EDR) is an indispensable supplement to current defenses. As Gartner points out, “Organizations investing in EDR tools are purposefully moving from an ‘incident response’ mentality to one of ‘continuous monitoring’ in search of incidents that they know are constantly occurring."

Download…

McAfee Labs Threats Report June 2016

Mobile operating systems support multiple communication methods between apps running on mobile devices. Unfortunately, these handy interapp communication mechanisms also make it possible to carry out harmful actions in a collaborative fashion. Two or more mobile apps, viewed independently, may not appear to be malicious. However, together they could become harmful by exchanging information with one another. Multiapp threats such as these were considered theoretical for some years, but McAfee Labs recently observed colluding code embedded in multiple applications in the wild. In this Key Topic, we provide a concise definition of mobile app collusion, explain how mobile app collusion attacks are manifested, and how businesses can protect themselves from such attacks.

Download…

Click for details

McAfee Labs Threat-Report

McAfee Labs ist eine der weltweit führenden Quellen für Bedrohungsforschung sowie -daten und ein Vordenker in Bezug auf Cyber-Sicherheit. Dank der Daten von Millionen Sensoren für alle wichtigen Bedrohungsvektoren (Dateien, Web, Nachrichten und Netzwerke) bietet McAfee Labs Echtzeit-Bedrohungsdaten, wichtige Analysen und Expertenwissen für besseren Schutz und Risikominimierung. McAfee ist jetzt ein Geschäftsbereich von Intel Security.

Download…

Click for details

Kontinuierliche Überwachung. Schnelle Reaktion.

Im vergangenen Jahr gingen jeden Tag 2.803.036 Datensätze aufgrund von Datenkompromittierungen oder Diebstahl verloren. Aktuelle Untersuchungen zeigen, dass diese Zahl weiterhin mit alarmierender Geschwindigkeit wächst. Allein die Gesamtzahl der Datenkompromittierungen lag 2015 bei 1.540 Fällen, was einem Anstieg von 46 Prozent im Vergleich zum Vorjahr entspricht.1 Deshalb wird den meisten sicherheitsbewussten Unternehmen schnell klar, dass die herkömmlichen Endgerätesicherheitslösungen, bei denen sie sich nach der Einrichtung um nichts kümmern müssen, für die Abwehr der täglichen Flut an Zero-Day- und hochentwickelten gezielten Angriffen unzureichend sind. Sicherheitsteams benötigen einen kontinuierlichen Überblick über alle Endgeräteaktivitäten und nicht nur Warnungen von Sicherheitsprodukten, nachdem ein Zwischenfall bereits eingetreten ist. Die Erkennungs- und Reaktionsmöglichkeiten für Endgeräte (EDR) sind daher eine unverzichtbare Unterstützung für Ihre vorhandenen Abwehrmaßnahmen. Laut Gartner „bewegen sich Unternehmen, die in EDRTools investieren, gezielt von einer Mentalität der 'Reaktion auf tatsächlich eingetretene Zwischenfälle' hin zu 'kontinuierlicher Überwachung', bei der nach Zwischenfällen gesucht wird, die bekanntermaßen ständig eintreten.“

Download…

Click for details

Business-centric DLP

Re-think your DLP – This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Download…

Select a topic