All resources sponsored by:

McAfee, Inc.

6 Matches
Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER:McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Operational Efficiencies of Proactive Vulnerability Management
sponsored by McAfee, Inc.
WHITE PAPER:View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.
Posted: 01 Sep 2011 | Published: 29 Aug 2011
Get This Now


Mobility and Security: Dazzling Opportunities, Profound Challenges
sponsored by McAfee, Inc.
ANALYST REPORT:Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.
Posted: 23 Aug 2011 | Published: 23 Aug 2011
Get This Now


McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution
sponsored by McAfee, Inc.
WHITE PAPER:This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.
Posted: 18 Aug 2011 | Published: 18 Aug 2011
Get This Now


Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF:Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010
Get This Now


McAfee Threats Report: Third Quarter 2010
sponsored by McAfee, Inc.
ANALYST REPORT:This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.
Posted: 02 Dec 2010 | Published: 02 Dec 2010
Get This Now


6 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement