IT Security: Threats

Click for details

Integrating SIEM into Your Threat Hunting Strategy

The intelligent use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today’s threatscape, we cannot ignore any of the three.

This whitepaper explores building a threat hunting toolkit and a typical threat hunt in today's security landscape.

Download…

Click for details

McAfee Integrated Threat Defense Solution

IDC validated five key user case scenarios leveraging the McAfee Integrated Threat Defense Solution including:

  • Zero-day malware protection with dynamic endpoint
  • Ransomware drive by download protection
  • Server Malware Protection via App Control
  • Threat Hunting
  • Malware protection with IPS
This whitepaper discusses the essential capabilities for analyzing and protecting against advanced threats.

Download…

Click for details

Automation and Analytics versus the Chaos of Cybersecurity Operations

Cybersecurity operations and analytics is made up of a complex set of processes, tools, and personnel focused on cyber threat prevention, detection, and response. Organizations must block known malicious behavior, as well as collect, process, and analyze internal and external data, identify and investigate suspicious activities, and remediate problems quickly before minor issues become major data breaches.

These standard requirements have become more sophisticated and complicated, according to nearly three-quarters (72%) of survey respondents. This whitepaper highlights the move towards a security operations and analytics platform architecture in response to the chaotic state of security operations and analytics today.

Download…

Click for details

Automation and Orchestration Solution to SOC Overload

This infographic highlights the importance of orchestration and automation when facing security threats.

Download…

Click for details

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

By adding a security information and event management (SIEM) solution from McAfee and integrating it with McAfee ePolicy Orchestrator (McAfee ePO™) software, as well as nonMcAfee products, the largest independent physician-led healthcare organization in the northeastern US has significantly strengthened its ability to quickly protect, detect, and correct when facing cyberthreats. This case study highlights how the healthcare provider manages SIEM and integrated security.

Download…

Click for details

British Acute Healthcare Provider Builds Adaptable Security Infrastructure

By building an adaptable security infrastructure based on the McAfee integrated security platform, this small information security team dramatically improved its ability to defend its organization, staff, and patients, despite an environment of continual change.

Find out how the small team bolsters security amidst continuously changing requirements, environment, and threat landscape.

Download…

Click for details

Die Ransomware-Bedrohung

So erkennen Sie einen Angriff, bevor es zu spät ist

Download…

Click for details

The Ransomware Threat: A guide to detecting an attack before it’s too late

WannaCry: What we know

Download…

Click for details

CISO's Investigate: User Behavior Analytics

Click for more details

Download…

Click for details

Definitive Guide to Security Intelligence and Analytics

Find and Stop Attacks Sooner to Prevent Data Breaches and Minimize Damage

Download…

Click for details

The General Data Protection Regulation (GDPR)

Get the facts and prepare your business

Download…

Click for details

There is no Silver Bullet

Click for more details

Download…

Click for details

Intel Security-Playbook: Ihr Weg zur sicheren Cloud

Click for more details

Download…

Click for details

Schutz der privaten Cloud mit integrierter und automatisierter Sicherheit

Die IT sieht sich den folgenden drei Hauptherausforderungen gegenüber. Mangelnder Überblick über den gesamten Datenverkehr, um gezielte Angriffe verhindern zu können. Herausforderung, Sicherheit im Tempo der Cloud sicherzustellen. Mangelnde Fähigkeit, Sicherheitsrichtlinien zuverlässig zu verwalten und starke. Service Level Agreements (SLAs) sicherzustellen, um die Anforderungen von. Geschäftsbereichen zu erfüllen

Download…

Click for details

Calculating the return on investment in layered security

Click for more details

Download…

Click for details

The business case for layered security

Click for more details

Download…

Click for details

La fin des antivirus ?

Click for more details

Download…

Click for details

Calculer le retour sur investissement avec la sécurité multicouche

Click for more details

Download…

Click for details

Arguments en faveur de la sécurité multicouche

Click for more details

Download…

Click for details

So schützen sie ihr unternehmen vor Ransomware

Click for more details

Download…

Click for details

Gründe für die wichtigkeit einer sicherheit auf mehreren ebenen

Click for more details

Download…

Click for details

Haben sich Antivirenprogramme erledigt?

Click for more details

Download…

Click for details

Perché La Protezione Multi-Livello é Importante

Click for more details

Download…

Click for details

Il business case per la sicurezza a più livelli

Click for more details

Download…

Click for details

Calcolo del ritorno del capitale investito nella sicurezza a più livelli

Click for more details

Download…

Protecting Against Imposter Email Threats

Click for more details

Download…

Click for details

Überwindung des Angreifervorteils mit McAfee Endpoint Security

Click for more details

Download…

Click for details

Demystifying Mobile Security Attacks

Click for more details

Download…

Click for details

3 Steps to implementing an effective BYOD Mobile Security Stategy

Click for more details

Download…

Click for details

The top 4 Cyber Security Threats to Android Mobile Devices

Click for more details

Download…

Click for details

The Top 6 Cyber Security Threats to IOS Devices

Click for more details

Download…

Click for details

Top 6 Security Considerations in Migrating to Microsoft Windows 10

The release of a new Microsoft operating system is always an important event for IT departments. Download this whitepaper to learn more.

Download…

Click for details

Zscaler Is A Leader Among SaaS Web Content Security

Zscaler has been positioned as a leader in The Forrester Wave™: SaaS Web Content Security, Q2 2015 from Forrester Research

Download…

Click for details

Magic Quadrant for Secure Web Gateways

The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly.

Download…

Click for details

Vendor Landscape: Security Information & Event Management (SIEM)

Select an appropriate SIEM solution based on vendor research; create an implementation roadmap; and define your SIEM architecture.

Download…

Click for details

Protective Monitoring and the UK Public Services Network (PSN)

Conducting business and delivering services online has delivered great benefits but there are associated risks that customers and the public are increasingly becoming aware of.

Download…

Click for details

Security intelligence: solving the puzzle for actionable insight

The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent.

Download…

Click for details

Financial Conduct Authority – Financial Crime: A guide for Firms

LogRhythm’s integrated architecture has been specifically designed to provide real-time continuous, automated monitoring for the detection and prevention of both security and fraudulent related activity.

Download…

Click for details

What Cloud-based contact centres will mean for customer satisfaction

Much has been written about the business benefits of moving the contact centre to the Cloud – but how does this transition translate into benefits to your customer?

Download…

Click for details

Visibility into Data Center Security and Operations Management with Trend Micro and Vmware

VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. Today, most organizations are highly virtualized on VMware, and this has produced significant savings. VMware and Trend Micro are committed to creating solutions that optimize security, manageability, and business continuity, while allowing IT to meet service level agreements (SLAs).

Download…

Click for details

Advanced Threat Protection for Patient Health Information

Better insights and sandboxing with Trend Micro™ Deep Discovery™ Inspector and Trend Micro™ Deep Discovery™ Analyzer gives hospital automated, proactive defense stance against APTs

Download…

Click for details

Gulftainer IT Safe Guarded with Trend Micro Enterprise Suite

Deep Security and Enterprise Security Suite increase visibility and defend against malware to secure VMware and mobile users

Download…

Click for details

Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, 2014–2015

Organizations are being targeted by ever more advanced and persistent malware, which continues to raise threat levels and increases the requirement for better endpoint/mobile device protection.

Download…

Click for details

The State Of Public Cloud Security

Part One Of A Three-Part Series On Public Cloud Security

Download…

Click for details

Custom Defense Against Targeted Attacks

See how adopting a Custom Defense approach will enable you to enhance your current security investments while providing new weapons to fight back against your attackers.

Download…

Click for details

21st Century Threats Demand 21st Century Security Approaches

Forward-Thinking Security Pros Will Guide Their Organizations To A Secure Future

Download…

Click for details

Surfacing Critical Cyber Threats Through Security Intelligence

The rapidly expanding supply chain supporting the cybercrime economy is empowering cyber criminals, cyber terrorists and even nation states in ways that put companies, critical infrastructure and governments at increased risk. The fate of an organization whose defenses have been compromised will be determined by the speed with which they can detect and respond to intruders. A mature security intelligence posture boosts an organization’s resiliency amidst these advanced threats. If intruders are detected early in their lifecycle, organizations can respond quickly and potentially avoid loss altogether. In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats. Key themes to be covered include: • Emerging cyber threat vectors in 2015 • Security Intelligence and the critical role it plays in addressing high-impact threats • Using the SIMM to assess your current Security Intelligence Maturity • How to move from “greatly exposed” to “highly resilient” via End-to-End Threat Lifecycle Management

Download…

Click for details

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.

Download…

Click for details

SANS “Top 20” Critical Controls for Effective Cyber Defense

In a rapidly evolving threat landscape, organizations must protect their entire IT environment against both external and internal attacks. Threats and risks arrive from many angles, requiring security professionals to use a wide variety of methods to defend against attacks. As a result, many organizations are now adopting the 20 Critical Security Controls developed by the SANS Institute. These controls help organizations prioritize the most effective methods and policies for safeguarding their assets, information and infrastructure.

Download…

Click for details

Retail Cyber Crime

Over the past few years, several retail organizations have been hit with high-profile data breaches that have left millions of customers’ credit card details and personal information exposed. Retailers will continue to be prime targets for motivated cyber criminals targeting sensitive and lucrative customer data, and must take steps to secure delicate information.

Download…

Click for details

DDoS Attacks in the Gaming Industry

Given its high-volume, high-transactional environment, the gaming industry must ensure 24/7 platform availability, 365 days a year. Any downtime has a significant financial and reputational impact. This makes gaming companies especially sensitive to DDoS attacks not only by hackers, but also by competitors and disgruntled clients.

Download…

Click for details

Continuous Monitoring for the New IT Landscape

Recent breaches have targeted a fatal flaw in the way organizations have approached security over the last two decades. Find out how continuous monitoring for the new IT landscape can help.

Download…

Click for details

Cybercriminals Use What Works: Targeted Attack Methodologies for Cybercrime

This research paper will give details on some of the reasons why cybercriminals are adopting targeted attack methodologies by delving into a few case studies that show how they are doing so.

Download…

Click for details

Calculating the Business Value of Next Generation Firewall

IDC articulates the business benefits derived by companies that have deployed NGFWs. The information in this report is based on in–depth interviews with actual NGFW customers.

Download…

Click for details

APT28: A Window into Russia’s Cyber Espionage Operations?

Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.

Download…

Click for details

Eight Must-Have Features for Ultimate Network Security Resource Optimization

The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations.

Download…

Click for details

The Security Industry’s Dirty Little Secret

Some of hackers’ dirty little secret weapons used to penetrate even the most locked-down networks are Advanced Evasion Techniques (AETs).

Download…

Click for details

Deny and Defuse Designer Threats

Most companies depend heavily on two or three layers to defend against advanced threats: an initial line of defence at the Internet gateway, plus a second layer on each desktop or server.

Download…

Click for details

Demand More

Get the most from the move to a next-generation firewall. Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Download…

Click for details

Protect Against Advanced Evasion Techniques

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.

Download…

Click for details

Advanced Evasion Techniques For Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Download…

Click for details

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.

Download…

Click for details

Data Loss by the Numbers

Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.

Download…

Click for details

Securing Cloud-Based Communications

Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors

Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.

Download…

Click for details

7 Requirements for Hybrid Web Delivery

Read this whitepaper to find out how the McAfee Hybrid Delivery Architecture defines critical requirements that allow IT to apply traditional risk management to web security.

Download…

Click for details

McAfee Enhanced Server Protection

Server performance fuels business performance. Servers also store and use your company’s most valuable and sensitive information. These two facts pose a dilemma for data center and security managers: should they maximize server protection at the expense of performance or optimize server performance and risk a serious security breach? With McAfee® Enhanced Server Protection, you never have to make that choice. Our solution provides advanced threat protection, reduces compliance and management costs, and maintains server performance and availability.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

McAfee Security Management

Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.

Download…

Click for details

Expand Virtualization, Maintain Security

This whitepaper looks at how McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.

Download…

Click for details

Counter Stealthy Attacks

The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organisations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

Download…

Click for details

NSS Labs Corporate AV/EPP Comparative Analysis: McAfee Achieves Highest Score in Exploit Protection

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Download…

Click for details

Endpoint Security: Anti-Virus Alone is Not Enough

The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

Advanced Malware Appliances

Advanced malware appliances defend the network from malicious files, or malware. According to Gartner, “The advanced threat prevention appliance market is defined by appliance-based products whose primary purpose is to capture and evaluate network traffic in order to detect and/or prevent advanced forms of customized targeted malware.” Advanced malware appliances typically use one of the following techniques to detect malware: program emulation, object code walkthrough with static analysis, or sandboxing. Currently, more of the excitement in the market is centered on dynamic sandboxing approaches, but there are undeniable advantages to other techniques. Static analysis examines object code without actually executing the code. It examines all possible execution paths and variable values, uncovering attacks that may not immediately manifest (they could occur weeks or months after initial execution). On the other hand, sandboxing, or dynamic analysis, analyzes the behavior of the malware during runtime. It discovers attacks and malicious behavior that are typically too complex to be discovered by static code analysis.

Download…

Click for details

Discovering Vulnerable Web Applications

Vulnerabilities in web applications are a major vector for cybercrime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business.

Download…

Click for details

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday’s vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization’s control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Download…

Click for details

Keep your PCs safe while surfing the Web

The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.

Download…

Click for details

Best Practices for Selecting a Web Application Scanning Solution

Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Automating the SANS 20 Critical Security Controls with QualysGuard

The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets.

Download…

Click for details

Achieve Situational Awareness

If you administer or manage endpoints, you probably have discovered an infected or compromised system. Your !rst reaction is to !nd the system and clean it, so that it does not affect your other systems, and the user can get back to work. Your second reaction is probably “how did this system get infected or compromised?” Unfortunately, most organizations do not have the ability to easily piece together all the information needed to understand an infection incident such as this. If just a single system is affected, it is a luxury for an administrator to track down the root cause—a luxury few can or choose to afford.

Download…

Click for details

What Do You Mean – My Cloud Data Isn’t Secure

As today’s businesses transition more critical applications to the cloud, there is an implicit perception and expectation that the critical information is more secure in the cloud than it is on private systems. This shift in data management strategy has implications for IT managed service providers and their end user customers. The real state of data protection is actually quite different for both environments and depends upon a number of factors, some of which are discussed here.

Download…

Click for details

Web App Security For Dummies

This free eBook simply explains about web application security, how to successfully use a web application scanner and best ways to remediate security vulnerabilities.

Download…

Click for details

Vulnerability Management For Dummies

This free eBook provides a vital overview of Vulnerability Management, including your protection options and ten best practices to implement.

Download…

Select a topic