IT Security: Intrusion Detection & Prevention

Click for details

The BEC Survival Guide

Click for more details

Download…

Click for details

Managing the Insider Threat with Active Directory Security

Click for more details

Download…

Click for details

Schutz der privaten Cloud mit integrierter und automatisierter Sicherheit

Die IT sieht sich den folgenden drei Hauptherausforderungen gegenüber. Mangelnder Überblick über den gesamten Datenverkehr, um gezielte Angriffe verhindern zu können. Herausforderung, Sicherheit im Tempo der Cloud sicherzustellen. Mangelnde Fähigkeit, Sicherheitsrichtlinien zuverlässig zu verwalten und starke. Service Level Agreements (SLAs) sicherzustellen, um die Anforderungen von. Geschäftsbereichen zu erfüllen

Download…

Click for details

Understanding Ransomware and Strategies to Defeat it

Click for more details

Download…

Security in Unison

Organizations face multiple security and operational challenges as they attempt to mount an effective defense against today’s emerging threats. Zero-day and advanced targeted attacks use payloads that have never been seen before. Polymorphic malware threats also pose similar challenges. On their own, traditional, signature-based countermeasures have difficulty detecting advanced malware payloads.

Download…

Click for details

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee® Endpoint Security—part of the Intel® Security product offering—enables customers to respond to and manage the threat defense lifecycle and provides a collaborative, extensible framework to reduce the complexity of conventional multivendor endpoint security environments. It also protects productivity with fast, effective performance and visibility into advanced threats to speed detection and remediation response times. Global threat intelligence and real time local event intelligence are shared between endpoints to further aid in rapid detection and response while management is kept simple through a true centralized console and easy to read dashboards and reports. McAfee Endpoint Security is built for real-time communication between threat defenses. Events and threat insights are shared with multiple technologies to take immediate actions against suspicious applications, downloads, websites, and files. Redundancies can be found and removed while multiple defenses are united on a common endpoint architecture that is built with the future in mind.

Download…

McAfee Labs Threats Report June 2016

Mobile operating systems support multiple communication methods between apps running on mobile devices. Unfortunately, these handy interapp communication mechanisms also make it possible to carry out harmful actions in a collaborative fashion. Two or more mobile apps, viewed independently, may not appear to be malicious. However, together they could become harmful by exchanging information with one another. Multiapp threats such as these were considered theoretical for some years, but McAfee Labs recently observed colluding code embedded in multiple applications in the wild. In this Key Topic, we provide a concise definition of mobile app collusion, explain how mobile app collusion attacks are manifested, and how businesses can protect themselves from such attacks.

Download…

Click for details

DDoS Defense for Financial Services Companies

Distributed denial of service (DDoS) attacks are increasingly becoming one of the most grievous security threats that any company with a significant online presence faces. In fact, four of the top five security threats today are DDoS related, with an average of 2,000–3,000 DDoS attacks per day on enterprises, financial institutions and governments.1 And the reality is that the severity, frequency and complexity of these attacks are on the rise, with no end in sight.

Download…

Click for details

Protect Your Business

Purpose-Built DDoS Defense for eCommerce

Download…

Click for details

End-to-End DDoS Defense for Financial Services

Motivated by idealistic and monetary goals, well-organized hacker groups have set their sights on financial institutions and are attacking with a vengeance—armed with institutional intelligence and striking with unprecedented persistence. Because of this, every financial services company—whether a multi-million dollar bank or a local credit union—is now a potential target for distributed denial of service (DDoS) threats.

Download…

Click for details

APT28: A Window into Russia’s Cyber Espionage Operations?

Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.

Download…

Click for details

Demand More

Get the most from the move to a next-generation firewall. Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Download…

Click for details

Protect Against Advanced Evasion Techniques

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.

Download…

Click for details

Advanced Evasion Techniques For Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Scanning Web Applications for Vulnerabilities

This whitepaper looks at how to scan web applications for vulnerabilities and safeguard your critical web applications.

Download…

Click for details

Managing Risk in Changing Times

As an IT security executive, you have to love challenges. Otherwise, why would you stay in a profession where you’re tested every day by hackers, thieves, and corrupt organizations? A profession that requires constant vigilance, even as the boundaries of your organization change minute by minute.

Download…

Click for details

Counter Stealthy Attacks

The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organisations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

A Prudent Approach to Next-generation Network Security

This whitepaper assesses a new strategy for network security. Read on to find out more…

Download…

Click for details

The Big Security Data Challenge

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Download…

Select a topic