IT Security: Viruses

Click for details

Beyond the Phish 2019 Report

Click for more details

Download…

Click for details

Is Antivirus Dead?

Detecting Malware and Viruses in a Dynamic Threat Environment

Download…

Click for details

Zscaler Is A Leader Among SaaS Web Content Security

Zscaler has been positioned as a leader in The Forrester Wave™: SaaS Web Content Security, Q2 2015 from Forrester Research

Download…

Click for details

Magic Quadrant for Secure Web Gateways

The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly.

Download…

Click for details

What Cloud-based contact centres will mean for customer satisfaction

Much has been written about the business benefits of moving the contact centre to the Cloud – but how does this transition translate into benefits to your customer?

Download…

Click for details

Visibility into Data Center Security and Operations Management with Trend Micro and Vmware

VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. Today, most organizations are highly virtualized on VMware, and this has produced significant savings. VMware and Trend Micro are committed to creating solutions that optimize security, manageability, and business continuity, while allowing IT to meet service level agreements (SLAs).

Download…

Click for details

Advanced Threat Protection for Patient Health Information

Better insights and sandboxing with Trend Micro™ Deep Discovery™ Inspector and Trend Micro™ Deep Discovery™ Analyzer gives hospital automated, proactive defense stance against APTs

Download…

Click for details

Gulftainer IT Safe Guarded with Trend Micro Enterprise Suite

Deep Security and Enterprise Security Suite increase visibility and defend against malware to secure VMware and mobile users

Download…

Click for details

Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, 2014–2015

Organizations are being targeted by ever more advanced and persistent malware, which continues to raise threat levels and increases the requirement for better endpoint/mobile device protection.

Download…

Click for details

The State Of Public Cloud Security

Part One Of A Three-Part Series On Public Cloud Security

Download…

Click for details

Custom Defense Against Targeted Attacks

See how adopting a Custom Defense approach will enable you to enhance your current security investments while providing new weapons to fight back against your attackers.

Download…

Click for details

21st Century Threats Demand 21st Century Security Approaches

Forward-Thinking Security Pros Will Guide Their Organizations To A Secure Future

Download…

Click for details

Know and Secure the Enterprise

In today’s hyper-connected world, the financial performance and brand integrity of your company greatly depend on the operational performance and security of your network.

Download…

Click for details

Continuous Monitoring for the New IT Landscape

Recent breaches have targeted a fatal flaw in the way organizations have approached security over the last two decades. Find out how continuous monitoring for the new IT landscape can help.

Download…

Click for details

Cybercriminals Use What Works: Targeted Attack Methodologies for Cybercrime

This research paper will give details on some of the reasons why cybercriminals are adopting targeted attack methodologies by delving into a few case studies that show how they are doing so.

Download…

Click for details

Calculating the Business Value of Next Generation Firewall

IDC articulates the business benefits derived by companies that have deployed NGFWs. The information in this report is based on in–depth interviews with actual NGFW customers.

Download…

Click for details

Eight Must-Have Features for Ultimate Network Security Resource Optimization

The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations.

Download…

Click for details

The Security Industry’s Dirty Little Secret

Some of hackers’ dirty little secret weapons used to penetrate even the most locked-down networks are Advanced Evasion Techniques (AETs).

Download…

Click for details

Deny and Defuse Designer Threats

Most companies depend heavily on two or three layers to defend against advanced threats: an initial line of defence at the Internet gateway, plus a second layer on each desktop or server.

Download…

Click for details

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

7 Requirements for Hybrid Web Delivery

Read this whitepaper to find out how the McAfee Hybrid Delivery Architecture defines critical requirements that allow IT to apply traditional risk management to web security.

Download…

Click for details

McAfee Enhanced Server Protection

Server performance fuels business performance. Servers also store and use your company’s most valuable and sensitive information. These two facts pose a dilemma for data center and security managers: should they maximize server protection at the expense of performance or optimize server performance and risk a serious security breach? With McAfee® Enhanced Server Protection, you never have to make that choice. Our solution provides advanced threat protection, reduces compliance and management costs, and maintains server performance and availability.

Download…

Click for details

Managing Risk in Changing Times

As an IT security executive, you have to love challenges. Otherwise, why would you stay in a profession where you’re tested every day by hackers, thieves, and corrupt organizations? A profession that requires constant vigilance, even as the boundaries of your organization change minute by minute.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

McAfee Security Management

Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.

Download…

Click for details

Expand Virtualization, Maintain Security

This whitepaper looks at how McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.

Download…

Click for details

Corporate AV/EPP Comparative Analysis­ – Exploits-Evasion Defenses

A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.

Download…

Click for details

A Buyer’s Guide to Endpoint Protection Platforms

A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.

Download…

Click for details

Endpoint Security: Anti-Virus Alone is Not Enough

The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”

Download…

Click for details

A Prudent Approach to Next-generation Network Security

This whitepaper assesses a new strategy for network security. Read on to find out more…

Download…

Click for details

Best Practices for Selecting a Web Application Scanning Solution

Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Automating the SANS 20 Critical Security Controls with QualysGuard

The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets.

Download…

Click for details

The Big Security Data Challenge

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Download…

Click for details

Vulnerability Management For Dummies

This free eBook provides a vital overview of Vulnerability Management, including your protection options and ten best practices to implement.

Download…

Select a topic