IT Security: Vulnerability


Beyond the Phish 2019 Report
Click for more details
Download…


So schützen sie ihr unternehmen vor Ransomware
Click for more details
Download…


Gründe für die wichtigkeit einer sicherheit auf mehreren ebenen
Click for more details
Download…


Perché La Protezione Multi-Livello é Importante
Click for more details
Download…


Il business case per la sicurezza a più livelli
Click for more details
Download…


APT28: A Window into Russia’s Cyber Espionage Operations?
Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.
Download…


Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Download…


Data Loss by the Numbers
Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.
Download…


Securing Cloud-Based Communications
Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.
Download…


Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors
Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.
Download…


Assessing Vulnerabilities
To achieve efficient vulnerability assessment, it is necessary to step beyond point products and disparate tools and integrate vulnerability assessment into a broader enterprise workflow. Read this whitepaper to find out more.
Download…


7 Requirements for Hybrid Web Delivery
Read this whitepaper to find out how the McAfee Hybrid Delivery Architecture defines critical requirements that allow IT to apply traditional risk management to web security.
Download…


Supercharge Your Security
This whitepaper discusses how to improve security levels and event response with automated network intelligence.
Download…


Protecting Information
For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.
Download…


Protecting the Data Center
Find out how Mcafee protects you against, data theft, fraud, and operational and patch paralysis and allows the business continuity and full protection of data center applications whist maintaining high network performance.
Download…


McAfee Security Management
Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.
Download…


Corporate AV/EPP Comparative Analysis – Exploits-Evasion Defenses
A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.
Download…


Business-centric DLP
Re-think your DLP – This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Download…


Endpoint Security: Anti-Virus Alone is Not Enough
The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”
Download…


Network Intrusion Prevention System
NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.
Download…


Adding Zero-Day Offense to Vulnerability Management
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won’t have a patch available when it’s needed.
Download…


Discovering Vulnerable Web Applications
Vulnerabilities in web applications are a major vector for cybercrime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business.
Download…


Patch Acceleration for Stronger Security
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process.
Download…


Keep your PCs safe while surfing the Web
The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.
Download…


Best Practices for Selecting a Web Application Scanning Solution
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business.
Download…


Best Practices for Selecting a Vulnerability Management (VM) Solution
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.
Download…


Automating the SANS 20 Critical Security Controls with QualysGuard
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets.
Download…


Achieve Situational Awareness
If you administer or manage endpoints, you probably have discovered an infected or compromised system. Your !rst reaction is to !nd the system and clean it, so that it does not affect your other systems, and the user can get back to work. Your second reaction is probably “how did this system get infected or compromised?” Unfortunately, most organizations do not have the ability to easily piece together all the information needed to understand an infection incident such as this. If just a single system is affected, it is a luxury for an administrator to track down the root cause—a luxury few can or choose to afford.
Download…


What Do You Mean – My Cloud Data Isn’t Secure
As today’s businesses transition more critical applications to the cloud, there is an implicit perception and expectation that the critical information is more secure in the cloud than it is on private systems. This shift in data management strategy has implications for IT managed service providers and their end user customers. The real state of data protection is actually quite different for both environments and depends upon a number of factors, some of which are discussed here.
Download…


Know Your Endpoints
Audit tools provide visibility and help protect endpoints, file shares and user accounts.
Download…


Web App Security For Dummies
This free eBook simply explains about web application security, how to successfully use a web application scanner and best ways to remediate security vulnerabilities.
Download…


Vulnerability Management For Dummies
This free eBook provides a vital overview of Vulnerability Management, including your protection options and ten best practices to implement.
Download…
Related topics
Business Automation Asset Management Viruses Attacks Cybercrime Unified Data Protection Malware Spam Threats Database Software Intrusion Detection & Prevention Firewalls Analytics & Metrics Network Security Proofpoint Malwarebytes Spyware FireEye Patch Management Network Monitoring McAfee Risk Management Database Security Cloud Computing Application Security Data Protection & Privacy Deployment Big Data Business Continuity Data Loss Prevention (DLP) Endpoint Protection Zero-Day Qualys Web Applications Systems Management Kaseya Remote Desktop SupportSelect a topic
IT Management
- 16 Asset Management
- 73 Cloud Computing
- 3 Contact Centres
- 6 Deployment
- 1 Diagnostics
- 14 Email
- 5 Hardware Management
- 20 Implementation
- 23 IT Architecture
- 2 IT Governance
IT Security
- 3 Access Control
- 17 Application Security
- 26 Attacks
- 3 Business Continuity
- 12 BYOD
- 5 Compliance
- 9 Continuous Monitoring
- 45 Cybercrime
- 2 DDoS Attacks
- 11 Disaster Recovery
- 5 PCI Compliance
- 24 Risk Management
- 8 Spam
- 25 Spyware
- 88 Threats
- 7 Unified Data Protection
- 36 Viruses
- 32 Vulnerability
- 2 Zero-Day
Platforms
- 1 Android
- 5 Apache
- 1 iOS
- 1 Macintosh/OS X
- 14 Web Applications
- 3 Websites
- 1 Windows
Vendors
- 2 8x8
- 5 Absolute Software
- 6 Arbor Networks
- 4 BAE Systems
- 4 Barracuda
- 4 BeyondTrust
- 8 BMC
- 12 Brightcove
- 4 Brocade
- 15 CA
- 10 Check Point
- 9 ClickSoftware
- 25 Colt
- 33 Commvault
- 2 Contrast Security
- 1 Couchbase
- 17 Cylance
- 6 DataStax
- 3 Datto
- 11 Dell Boomi
- 2 DigiCert
- 5 Dimension Data
- 3 FireEye
- 10 Gigamon
- 4 Hewlett Packard Enterprise
- 2 Hornbill
- 17 Infor
- 1 Interxion
- 5 Intralinks
- 10 K2
- 24 Kaseya
- 1 Kingpin
- 4 LogicNow
- 15 Logitech
- 27 LogRhythm
- 23 Malwarebytes
- 9 Matrixx Software
- 99 McAfee
- 2 Mitel
- 3 Nanorep
- 5 NAVEX Global
- 3 New Signature
- 1 Nitro
- 13 OneIdentity
- 2 Opsview
- 7 Perforce
- 8 Pitney Bowes
- 39 Proofpoint
- 3 QinetiQ
- 23 Qlik
- 10 Quadrotech
- 37 Qualys
- 23 Quest
- 12 Sage
- 6 Salesforce
- 3 Siteimprove
- 4 SonicWall
- 2 Synapse360
- 5 Tenable
- 2 ThoughtSpot
- 30 Trend Micro
- 5 Truphone
- 20 VMware
- 4 Volta
- 1 VoltDelta
- 2 Wombat Security
- 5 Xactly
- 1 Zephyr Health
- 13 Zscaler