Data Management: Database Security

Click for details

Commvault Software Integration with HPE StoreOnce Catalyst

Click for more details

Download…

Click for details

Definitive Guide to Security Intelligence and Analytics

Find and Stop Attacks Sooner to Prevent Data Breaches and Minimize Damage

Download…

Click for details

Data Sovereignty in the Cloud

Click for more details

Download…

Click for details

Buyers Guide to Enterprise Collaboration Solutions

Click for more details

Download…

Click for details

Complying with the European General Data Protection Regulation

Click for more details

Download…

Click for details

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Click for more details

Download…

Click for details

Best Practices for Healthcare Data Breach Prevention

Click for more details

Download…

Click for details

Operationalizing Threat Intelligence

In a recent report, Forrester notes that 77% of North American and European enterprise security decision makers report that improving threat intelligence capabilities is a priority.2 Cyberthreat intelligence promises to give security practitioners advance warning of cybercriminals targeting their region, industry, or even specific firms so that they have time to take action, but IT security still faces some big challenges.

Download…

Click for details

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee® Endpoint Security—part of the Intel® Security product offering—enables customers to respond to and manage the threat defense lifecycle and provides a collaborative, extensible framework to reduce the complexity of conventional multivendor endpoint security environments. It also protects productivity with fast, effective performance and visibility into advanced threats to speed detection and remediation response times. Global threat intelligence and real time local event intelligence are shared between endpoints to further aid in rapid detection and response while management is kept simple through a true centralized console and easy to read dashboards and reports. McAfee Endpoint Security is built for real-time communication between threat defenses. Events and threat insights are shared with multiple technologies to take immediate actions against suspicious applications, downloads, websites, and files. Redundancies can be found and removed while multiple defenses are united on a common endpoint architecture that is built with the future in mind.

Download…

Monitor Continuously. Respond Swiftly.

Every day last year, 2,803,036 data records were lost or stolen as a result of a data breach—and research indicates that the numbers are climbing at an alarming rate. Data breaches totaled 1,540 last year, up 46% from the previous year.1 Most security-conscious organizations are quickly coming to the realization that traditional set-and-forget endpoint solutions are illequipped to handle the daily barrage of zero-day and advanced targeted attacks (ATAs). Security teams need uninterrupted visibility into endpoint activity, rather than just alerts from security products after something has already gone wrong. Endpoint detection and response (EDR) is an indispensable supplement to current defenses. As Gartner points out, “Organizations investing in EDR tools are purposefully moving from an ‘incident response’ mentality to one of ‘continuous monitoring’ in search of incidents that they know are constantly occurring."

Download…

Click for details

McAfee Labs Threat-Report

McAfee Labs ist eine der weltweit führenden Quellen für Bedrohungsforschung sowie -daten und ein Vordenker in Bezug auf Cyber-Sicherheit. Dank der Daten von Millionen Sensoren für alle wichtigen Bedrohungsvektoren (Dateien, Web, Nachrichten und Netzwerke) bietet McAfee Labs Echtzeit-Bedrohungsdaten, wichtige Analysen und Expertenwissen für besseren Schutz und Risikominimierung. McAfee ist jetzt ein Geschäftsbereich von Intel Security.

Download…

Click for details

Kontinuierliche Überwachung. Schnelle Reaktion.

Im vergangenen Jahr gingen jeden Tag 2.803.036 Datensätze aufgrund von Datenkompromittierungen oder Diebstahl verloren. Aktuelle Untersuchungen zeigen, dass diese Zahl weiterhin mit alarmierender Geschwindigkeit wächst. Allein die Gesamtzahl der Datenkompromittierungen lag 2015 bei 1.540 Fällen, was einem Anstieg von 46 Prozent im Vergleich zum Vorjahr entspricht.1 Deshalb wird den meisten sicherheitsbewussten Unternehmen schnell klar, dass die herkömmlichen Endgerätesicherheitslösungen, bei denen sie sich nach der Einrichtung um nichts kümmern müssen, für die Abwehr der täglichen Flut an Zero-Day- und hochentwickelten gezielten Angriffen unzureichend sind. Sicherheitsteams benötigen einen kontinuierlichen Überblick über alle Endgeräteaktivitäten und nicht nur Warnungen von Sicherheitsprodukten, nachdem ein Zwischenfall bereits eingetreten ist. Die Erkennungs- und Reaktionsmöglichkeiten für Endgeräte (EDR) sind daher eine unverzichtbare Unterstützung für Ihre vorhandenen Abwehrmaßnahmen. Laut Gartner „bewegen sich Unternehmen, die in EDRTools investieren, gezielt von einer Mentalität der 'Reaktion auf tatsächlich eingetretene Zwischenfälle' hin zu 'kontinuierlicher Überwachung', bei der nach Zwischenfällen gesucht wird, die bekanntermaßen ständig eintreten.“

Download…

Click for details

Sicherheit durch Einheit

Unternehmen sind gezwungen, effektive Schutzmaßnahmen gegen aktuelle und neue Bedrohungen zu implementieren. Dabei stehen sie vor zahlreichen Schwierigkeiten bei Sicherheit und Geschäftsabläufen. Zero-Day- sowie hochentwickelte gezielte Bedrohungen setzen Schaddaten ein, die noch nie zuvor beobachtet wurden. Polymorphe Malware-Bedrohungen stellen die Unternehmen vor ähnliche Probleme. Vorhandene herkömmliche und signaturbasierte Gegenmaßnahmen haben Schwierigkeiten, die Schaddaten hochentwickelter Malware zu erkennen.

Download…

Click for details

Sage Patch Advice Fact Sheet

Sage ERP X3 is a dedicated solution that lets businesses transform and perform through technology. However, it needs to be maintained and updated to deliver the most benefit – this can be a complex and time-consuming process. Sage Patch Advice is a new service for existing Sage ERP X3 customers that lets users apply the latest software patches easily and with confidence to let them gain the most benefit and advantage from their solution.

Download…

Click for details

Data Loss by the Numbers

Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.

Download…

Click for details

Securing Cloud-Based Communications

Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.

Download…

Click for details

Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors

Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.

Download…

Click for details

Protecting the Data Center

Find out how Mcafee protects you against, data theft, fraud, and operational and patch paralysis and allows the business continuity and full protection of data center applications whist maintaining high network performance.

Download…

Click for details

What Do You Mean – My Cloud Data Isn’t Secure

As today’s businesses transition more critical applications to the cloud, there is an implicit perception and expectation that the critical information is more secure in the cloud than it is on private systems. This shift in data management strategy has implications for IT managed service providers and their end user customers. The real state of data protection is actually quite different for both environments and depends upon a number of factors, some of which are discussed here.

Download…

Select a topic