All resources sponsored by:

McAfee, Inc.

13 Matches
Petya Ransomware: How McAfee Can Help
sponsored by McAfee, Inc.
TECHNICAL ARTICLE:Petya Ransomware wreaks havoc throughout networks and leaves machines unusable. Protect yourself with McAfee.
Posted: 07 Jul 2017 | Published: 07 Jul 2017
Get This Now

TOPICS:  IT Management

McAfee Labs Threats Report: June 2017
sponsored by McAfee, Inc.
WHITE PAPER:Learn about evasion techniques, steganography in the digital world and Fareit in the latest quarterly threats report.
Posted: 07 Jul 2017 | Published: 07 Jul 2017
Get This Now

TOPICS:  IT Management

Optimize Your SIEM Operations
sponsored by McAfee, Inc.
RESOURCE CENTER:Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
Posted: 21 Nov 2016 | Published: 21 Nov 2016
Get This Now


Resource Center: Stop Threats and Prevent Data Loss
sponsored by McAfee, Inc.
RESOURCE:Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016
Get This Now


Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE:This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016
Get This Now


Go Beyond Just Securing Your Cloud, Make it Better
sponsored by McAfee, Inc.
RESOURCE CENTER:Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016
Get This Now


Petya Ransomware: Attack Analysis
sponsored by McAfee, Inc.
TECHNICAL ARTICLE:A new variant in the Petya Ransomware introduced a new level of maliciousness. See how machines are being infected.
Posted: 07 Jul 2017 | Published: 07 Jul 2017
Get This Now

TOPICS:  IT Management

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER:McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


Operational Efficiencies of Proactive Vulnerability Management
sponsored by McAfee, Inc.
WHITE PAPER:View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.
Posted: 01 Sep 2011 | Published: 29 Aug 2011
Get This Now


Mobility and Security: Dazzling Opportunities, Profound Challenges
sponsored by McAfee, Inc.
ANALYST REPORT:Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.
Posted: 23 Aug 2011 | Published: 23 Aug 2011
Get This Now


McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution
sponsored by McAfee, Inc.
WHITE PAPER:This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.
Posted: 18 Aug 2011 | Published: 18 Aug 2011
Get This Now


Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF:Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010
Get This Now


McAfee Threats Report: Third Quarter 2010
sponsored by McAfee, Inc.
ANALYST REPORT:This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.
Posted: 02 Dec 2010 | Published: 02 Dec 2010
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement