Case Study: City of Gothenburg
By: McAfee, Inc. View more from McAfee, Inc. >>
Download this next:
How integrated security helps you innovate
By: McAfee
Type: Case Study
An arm of the regional government in Wallonia, Belgium needed to improve security across their 10,000 desktops, 1,300 servers and 1,000 major apps. They constructed three specific goals:
- Be ready to combat tomorrow’s cyberthreats
- Simplify security management
- Unify policies for the entire environment—on premises, at home and in the cloud
So how were they able to strengthen their posture with predictive intelligence and stronger, lighter endpoint security? View this case study to see how McAfee helped.
These are also closely related to: "Case Study: City of Gothenburg"
-
Protect data from device to cloud: McAfee solution brief
By: McAfee
Type: Product Overview
Today, more than 95% of companies use cloud services, and 83% store sensitive data in the cloud – yet only 30% of companies have the ability to protect their cloud data and devices.
To address this growing disparity, organizations need a way to secure their data as it moves between devices to the cloud and from cloud to cloud.
The following solution brief provides a closer look at the features and capabilities of McAfee’s Unified Cloud Edge – which combines 3 core technologies into a single, unified security tool:
- Cloud access security broker (CASB)
- Secure web gateway (SWG)
- Data loss prevention (DLP)
-
Protect data from device to cloud: McAfee solution brief
By: McAfee
Type: Data Sheet
Today, more than 95% of companies use cloud services, and 83% store sensitive data in the cloud – yet only 30% of companies have the ability to protect their cloud data and devices.
To address this growing disparity, organizations need a way to secure their data as it moves between devices to the cloud and from cloud to cloud.
The following solution brief provides a closer look at the features and capabilities of McAfee’s Unified Cloud Edge – which combines 3 core technologies into a single, unified security tool:
- Cloud access security broker (CASB)
- Secure web gateway (SWG)
- Data loss prevention (DLP)
Find more content like what you just read:
-
How to master remote work
By: McAfee
Type: White Paper
VPNs and other remote work strategies were vastly underprepared when the COVID-19 pandemic forced nearly every employee to work from home. Read this white paper to unlock some expert work from home (WFH) strategies to ensure your remote workforce has secure and scalable access.
-
CW Middle East Oct to Dec 2016
By: ComputerWeekly.com
Type: Ezine
In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.
-
Endpoint Security IT Decision Center Handbook 2
By: SearchSecurity.com
Type: eGuide
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
21 endpoint protection platform vendors & their core capabilities
By: CrowdStrike
Type: Analyst Report
Endpoint protection is evolving to address security architecture tasks such as hardening, investigation, incident detection and incident response. In this Gartner analysis report, discover critical capabilities of Endpoint Protection Platform vendors and how their products stack up.
-
Remediating IT vulnerabilities: Quick hits for risk prioritization
By: SearchSecurity.com
Type: eGuide
There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
-
Top 10 IT security stories of 2018
By: ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
Top 10 IT security stories of 2018
By: ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
12 EDR providers and how they stack up
By: Cybereason
Type: Analyst Report
As the enterprise detection and response (EDR) space continues to evolve, security analytics will dictate which providers will lead the pack. In this Forrester Wave, find 12 different EDR providers that matter the most and how they stack up.
-
Analysis & comparison of 15 endpoint security providers
By: CrowdStrike
Type: White Paper
Endpoints continue to remain at the top of the list for areas cyberattackers target in their campaigns. In order to protect their endpoints, organizations need to deploy an effective security strategy. This Forrester Wave report highlights and compares 15 key endpoint security vendors to guide your organization towards the right choice.
-
2020: The State of Endpoint Resilience Report: Explore key insights
By: Absolute Software Corporation
Type: Analyst Report
In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
-
Preventing data leaks & securing remote access: Case study
By: TransientX, Inc
Type: Case Study
In this case study, discover how Caglayanlar, an automotive parts distributor, addressed the growing complexities of their security environment and established a program to better manage and secure remote access to their critical data.
-
Cloud risk report: Work from home edition
By: McAfee
Type: White Paper
The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.
-
Managing data breaches
By: ComputerWeekly.com
Type: eGuide
In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.
-
Hacking the Human Operating System
By: ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Is it time for more proactive endpoint security?
By: McAfee
Type: Video
Now more than ever, security teams must get ahead of adversaries and their threat campaigns. View this short video for an overview and demo of endpoint security with McAfee MVISION Insights – an analytics platform that strives to prioritize threats that matter, predict the impact and prescribe improvements before the threat occurs.
-
Focus: how to avoid being hit by ransomware
By: ComputerWeekly.com
Type: eGuide
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
-
Computer Weekly – 24 October 2017: Where will AI take us?
By: ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
-
What can CIOs do about the skills shortage in ASEAN?
By: ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
-
July Essentials Guide on Cloud Computing
By: SearchSecurity.com
Type: eBook
This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
-
Webinar: A 3-step approach to securing modern endpoints
By: McAfee
Type: Video
Reactionary approaches to endpoint security will eventually prove to be a recipe for disaster. Watch this short video to learn about McAfee’s modern endpoint security capabilities – which emphasize the importance of prioritizing threats, predicting their impacts and proactively defending them.
-
3 ways to protect customers from ransomware
By: Datto, Inc.
Type: eBook
Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
-
Data privacy under the GDPR, machine learning, and more
By: ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
-
Buyer's Guide to Antimalware
By: SearchSecurity.com
Type: eGuide
Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
-
SIEM IT Decision Center- Checklist #2
By: SearchSecurity.com
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
Cyber Security 2016 and beyond
By: ComputerWeekly.com
Type: eGuide
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Top 10 cyber crime stories of 2018
By: ComputerWeekly.com
Type: eGuide
This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
-
Top Mobile Data Protection Best Practices
By: SearchSecurity.com
Type: eGuide
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
-
ESG Top Trends: How to secure cloud-native apps
By: McAfee
Type: Webcast
As organizations sprint to develop and deploy cloud-native apps, security often falls by the wayside. This may feel harmless at the time, but it vastly increases risk across the business. Watch this webinar – presented by ESG – to learn the top trends on cloud-native application protection and learn how McAfee can help secure these apps
-
An effective mobile device security policy
By: SearchSecurity.com
Type: eGuide
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
-
Video demo: Introducing MVision XDR
By: McAfee
Type: Video
Extended detection and response (XDR) are taking security operations by storm, but are they any better than tried-and-true EDR tools? Watch this short video for a closer look at the key features and capabilities of McAfee’s MVision XDR offering, and discover a virtual demo of the tool in-use.
-
Cybercrime: How it costs more than money
By: McAfee
Type: Analyst Report
$945 billion is the estimated monetary loss from cybercrime. This is a significant figure – but when you take a closer look, you’ll see that when it comes to organizational stability, efficiency, brand damage and trust, the cost of cybercrime goes far beyond what’s taken by criminals. View this report to learn the hidden costs of cybercrime.
-
CW Special report on Symantec
By: ComputerWeekly.com
Type: White Paper
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
-
eGuide: Information Security - Buyer's Guide to Messaging Security
By: SearchSecurity.com
Type: eGuide
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
-
Mobile data protection best practices
By: SearchSecurity.com
Type: eGuide
Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
-
Proactive security measures: How to prevent malware attacks
By: SearchSecurity.com
Type: eGuide
Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.
-
Ransomware in the industrial sector
By: Dragos
Type: Research Content
Ransomware has steadily become one of the most prevalent and destructive cyberthreats, especially across the industrial sector. Read this research report to dive deeper into ransomware observations, research findings, common attack patterns, predictions, and more.
-
Mobile EndPoint Security and Management - Best Practices
By: SearchSecurity.com
Type: eGuide
Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
By: SearchSecurity.com
Type: eGuide
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
MicroScope January 2014: A special issue looking at software defined networking
By: SearchSecurity.com
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
Computer Weekly 15 October 2019: Securing the internet of things
By: ComputerWeekly.com
Type: eGuide
In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
-
Uber and Volkswagen: Handling ethics in IT
By: ComputerWeekly.com
Type: Ezine
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
-
CW Benelux ezine August 2018
By: ComputerWeekly.com
Type: Ezine
It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
-
CIO Trends #7: Benelux
By: ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.
-
The importance of web security
By: ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
Debunking APT myths: What it really means and what you can do about it
By: SearchSecurity.com
Type: eGuide
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
-
Automated security with EDR at the core
By: Kaspersky
Type: Data Sheet
Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
-
Endpoint Management - IT handbook
By: SearchDataCenter.com
Type: eBook
Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.