All resources sponsored by:

McAfee, Inc.

1 - 25 of 65 Matches
Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST:This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013
Get This Now


Swedish Social Insurance Agency DoesBYOD Right
sponsored by McAfee, Inc.
CASE STUDY:This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security.
Posted: 02 Aug 2013 | Published: 02 Aug 2013
Get This Now


Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT:NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013
Get This Now


Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER:This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013
Get This Now


A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER:This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012
Get This Now


E-Guide: Rethink Defense-In-Depth Security Model For BYOD
sponsored by McAfee, Inc.
EGUIDE:This expert guide explains why endpoint defense-in-depth controls must assume the endpoint is compromised, and what paths you can take to get the most from your security system.
Posted: 23 Jul 2013 | Published: 23 Jul 2013
Get This Now


McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER:This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013
Get This Now


The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER:This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013
Get This Now


McAfee Endpoint Protection Suite
sponsored by McAfee, Inc.
WHITE PAPER:This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013
Get This Now


A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by McAfee, Inc.
WHITE PAPER:This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013
Get This Now


McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER:This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013
Get This Now


McAfee Enterprise Mobility Management platform
sponsored by McAfee, Inc.
WHITE PAPER:Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more.
Posted: 30 May 2013 | Published: 30 May 2013
Get This Now


The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER:This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013
Get This Now


McAfee Application Control
sponsored by McAfee, Inc.
WHITE PAPER:This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more.
Posted: 29 May 2013 | Published: 31 Dec 2012
Get This Now


Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE:This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012
Get This Now


Securing Medical Devices
sponsored by McAfee, Inc.
WHITE PAPER:This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information.
Posted: 25 May 2012 | Published: 25 May 2012
Get This Now


Security Information and Event Management: Unique McAfee data management technology
sponsored by McAfee, Inc.
WHITE PAPER:This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.
Posted: 23 Mar 2012 | Published: 23 Mar 2012
Get This Now


Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER:Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
Get This Now


A Decision Maker’s Guide to GRC Solutions
sponsored by McAfee, Inc.
EZINE:It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
Get This Now


Downloading Mobile Apps is Risky Business
sponsored by McAfee, Inc.
WHITE PAPER:Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by McAfee, Inc.
WHITE PAPER:For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
sponsored by McAfee, Inc.
WHITE PAPER:This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Say “Yes” to Mobile Devices
sponsored by McAfee, Inc.
WHITE PAPER:Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security
sponsored by McAfee, Inc.
WHITE PAPER:In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER:McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


1 - 25 of 65 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement