IT Security: Vulnerability

Click for details

Beyond the Phish 2019 Report

Click for more details

Download…

Click for details

So schützen sie ihr unternehmen vor Ransomware

Click for more details

Download…

Click for details

Gründe für die wichtigkeit einer sicherheit auf mehreren ebenen

Click for more details

Download…

Click for details

Perché La Protezione Multi-Livello é Importante

Click for more details

Download…

Click for details

Il business case per la sicurezza a più livelli

Click for more details

Download…

Click for details

APT28: A Window into Russia’s Cyber Espionage Operations?

Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.

Download…

Click for details

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.

Download…

Click for details

Data Loss by the Numbers

Virtually every day there are stories about data loss in the news. This paper focuses on raw data obtained through the Open Security Foundation’s Data Loss Database or DataLossDB to help support improved decision making.

Download…

Click for details

Securing Cloud-Based Communications

Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.

Download…

Click for details

Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors

Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.

Download…

Click for details

Assessing Vulnerabilities

To achieve efficient vulnerability assessment, it is necessary to step beyond point products and disparate tools and integrate vulnerability assessment into a broader enterprise workflow. Read this whitepaper to find out more.

Download…

Click for details

7 Requirements for Hybrid Web Delivery

Read this whitepaper to find out how the McAfee Hybrid Delivery Architecture defines critical requirements that allow IT to apply traditional risk management to web security.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

Protecting the Data Center

Find out how Mcafee protects you against, data theft, fraud, and operational and patch paralysis and allows the business continuity and full protection of data center applications whist maintaining high network performance.

Download…

Click for details

McAfee Security Management

Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.

Download…

Click for details

Corporate AV/EPP Comparative Analysis­ – Exploits-Evasion Defenses

A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.

Download…

Click for details

Business-centric DLP

Re-think your DLP – This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.

Download…

Click for details

Endpoint Security: Anti-Virus Alone is Not Enough

The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

Adding Zero-Day Offense to Vulnerability Management

A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won’t have a patch available when it’s needed.

Download…

Click for details

Discovering Vulnerable Web Applications

Vulnerabilities in web applications are a major vector for cybercrime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business.

Download…

Click for details

Patch Acceleration for Stronger Security

Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process.

Download…

Click for details

Keep your PCs safe while surfing the Web

The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.

Download…

Click for details

Best Practices for Selecting a Web Application Scanning Solution

Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Automating the SANS 20 Critical Security Controls with QualysGuard

The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets.

Download…

Click for details

Achieve Situational Awareness

If you administer or manage endpoints, you probably have discovered an infected or compromised system. Your !rst reaction is to !nd the system and clean it, so that it does not affect your other systems, and the user can get back to work. Your second reaction is probably “how did this system get infected or compromised?” Unfortunately, most organizations do not have the ability to easily piece together all the information needed to understand an infection incident such as this. If just a single system is affected, it is a luxury for an administrator to track down the root cause—a luxury few can or choose to afford.

Download…

Click for details

What Do You Mean – My Cloud Data Isn’t Secure

As today’s businesses transition more critical applications to the cloud, there is an implicit perception and expectation that the critical information is more secure in the cloud than it is on private systems. This shift in data management strategy has implications for IT managed service providers and their end user customers. The real state of data protection is actually quite different for both environments and depends upon a number of factors, some of which are discussed here.

Download…

Click for details

Know Your Endpoints

Audit tools provide visibility and help protect endpoints, file shares and user accounts.

Download…

Click for details

Web App Security For Dummies

This free eBook simply explains about web application security, how to successfully use a web application scanner and best ways to remediate security vulnerabilities.

Download…

Click for details

Vulnerability Management For Dummies

This free eBook provides a vital overview of Vulnerability Management, including your protection options and ten best practices to implement.

Download…

Select a topic