IT Security: Risk Management

Click for details

Modernize Change Management While Minimizing Business Risk

Technology is changing the world around us faster, and with greater impact, than ever before. The consumerization of enterprise IT continues to challenge working practices, while the proliferation of devices and endpoints is forcing us to build Internet of Things strategies for our enterprises. The explosion of virtualization and cloud technology is also introducing revolutionary, new ways to consume services. Managing a complex infrastructure is difficult; effectively managing continual change across a complex infrastructure can make or break an enterprise.

Download…

Click for details

Buyers Guide to Enterprise Collaboration Solutions

Click for more details

Download…

Click for details

La fin des antivirus ?

Click for more details

Download…

Click for details

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee® Endpoint Security—part of the Intel® Security product offering—enables customers to respond to and manage the threat defense lifecycle and provides a collaborative, extensible framework to reduce the complexity of conventional multivendor endpoint security environments. It also protects productivity with fast, effective performance and visibility into advanced threats to speed detection and remediation response times. Global threat intelligence and real time local event intelligence are shared between endpoints to further aid in rapid detection and response while management is kept simple through a true centralized console and easy to read dashboards and reports. McAfee Endpoint Security is built for real-time communication between threat defenses. Events and threat insights are shared with multiple technologies to take immediate actions against suspicious applications, downloads, websites, and files. Redundancies can be found and removed while multiple defenses are united on a common endpoint architecture that is built with the future in mind.

Download…

Click for details

Data Loss by the Numbers

Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.

Download…

Click for details

Securing Cloud-Based Communications

Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors

Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.

Download…

Click for details

Assessing Vulnerabilities

To achieve efficient vulnerability assessment, it is necessary to step beyond point products and disparate tools and integrate vulnerability assessment into a broader enterprise workflow. Read this whitepaper to find out more.

Download…

Click for details

7 Requirements for Hybrid Web Delivery

Read this whitepaper to find out how the McAfee Hybrid Delivery Architecture defines critical requirements that allow IT to apply traditional risk management to web security.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Managing Risk in Changing Times

As an IT security executive, you have to love challenges. Otherwise, why would you stay in a profession where you’re tested every day by hackers, thieves, and corrupt organizations? A profession that requires constant vigilance, even as the boundaries of your organization change minute by minute.

Download…

Click for details

Protecting the Data Center

Find out how Mcafee protects you against, data theft, fraud, and operational and patch paralysis and allows the business continuity and full protection of data center applications whist maintaining high network performance.

Download…

Click for details

McAfee Security Management

Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.

Download…

Click for details

Business-centric DLP

Re-think your DLP – This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Download…

Click for details

Manage Security and risk

Compliance and !nancial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. However, today the pace of threats – “low and slow” as targeted attacks or lightning fast as cyberactivism and malware outbreaks – demands that executives and IT administrators pay more attention to unfolding events and make rapid risk-based decisions on mitigation.

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

SANS Survey on Application Security Programs and Practices

Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.

Download…

Click for details

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday’s vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization’s control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Download…

Click for details

Keep your PCs safe while surfing the Web

The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Automating the SANS 20 Critical Security Controls with QualysGuard

The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets.

Download…

Click for details

Achieve Situational Awareness

If you administer or manage endpoints, you probably have discovered an infected or compromised system. Your !rst reaction is to !nd the system and clean it, so that it does not affect your other systems, and the user can get back to work. Your second reaction is probably “how did this system get infected or compromised?” Unfortunately, most organizations do not have the ability to easily piece together all the information needed to understand an infection incident such as this. If just a single system is affected, it is a luxury for an administrator to track down the root cause—a luxury few can or choose to afford.

Download…

Click for details

What Do You Mean – My Cloud Data Isn’t Secure

As today’s businesses transition more critical applications to the cloud, there is an implicit perception and expectation that the critical information is more secure in the cloud than it is on private systems. This shift in data management strategy has implications for IT managed service providers and their end user customers. The real state of data protection is actually quite different for both environments and depends upon a number of factors, some of which are discussed here.

Download…

Select a topic