You've requested...

Share this with your colleagues:

Download this next:

How integrated security helps you innovate

An arm of the regional government in Wallonia, Belgium needed to improve security across their 10,000 desktops, 1,300 servers and 1,000 major apps. They constructed three specific goals:

  • Be ready to combat tomorrow’s cyberthreats
  • Simplify security management
  • Unify policies for the entire environment—on premises, at home and in the cloud

So how were they able to strengthen their posture with predictive intelligence and stronger, lighter endpoint security? View this case study to see how McAfee helped.

These are also closely related to: "Case Study: City of Gothenburg"

  • Protect data from device to cloud: McAfee solution brief

    Today, more than 95% of companies use cloud services, and 83% store sensitive data in the cloudyet only 30% of companies have the ability to protect their cloud data and devices.

    To address this growing disparity, organizations need a way to secure their data as it moves between devices to the cloud and from cloud to cloud.

    The following solution brief provides a closer look at the features and capabilities of McAfee’s Unified Cloud Edge – which combines 3 core technologies into a single, unified security tool:

    • Cloud access security broker (CASB)
    • Secure web gateway (SWG)
    • Data loss prevention (DLP)

  • Protect data from device to cloud: McAfee solution brief

    Today, more than 95% of companies use cloud services, and 83% store sensitive data in the cloudyet only 30% of companies have the ability to protect their cloud data and devices.

    To address this growing disparity, organizations need a way to secure their data as it moves between devices to the cloud and from cloud to cloud.

    The following solution brief provides a closer look at the features and capabilities of McAfee’s Unified Cloud Edge – which combines 3 core technologies into a single, unified security tool:

    • Cloud access security broker (CASB)
    • Secure web gateway (SWG)
    • Data loss prevention (DLP)

Find more content like what you just read:

  • How to master remote work

    VPNs and other remote work strategies were vastly underprepared when the COVID-19 pandemic forced nearly every employee to work from home. Read this white paper to unlock some expert work from home (WFH) strategies to ensure your remote workforce has secure and scalable access.

    Download

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • Endpoint Security IT Decision Center Handbook 2

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

    Download

  • 21 endpoint protection platform vendors & their core capabilities

    Endpoint protection is evolving to address security architecture tasks such as hardening, investigation, incident detection and incident response. In this Gartner analysis report, discover critical capabilities of Endpoint Protection Platform vendors and how their products stack up.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • 12 EDR providers and how they stack up

    As the enterprise detection and response (EDR) space continues to evolve, security analytics will dictate which providers will lead the pack. In this Forrester Wave, find 12 different EDR providers that matter the most and how they stack up.

    Download

  • Analysis & comparison of 15 endpoint security providers

    Endpoints continue to remain at the top of the list for areas cyberattackers target in their campaigns. In order to protect their endpoints, organizations need to deploy an effective security strategy. This Forrester Wave report highlights and compares 15 key endpoint security vendors to guide your organization towards the right choice.

    Download

  • 2020: The State of Endpoint Resilience Report: Explore key insights

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

    Download

  • Preventing data leaks & securing remote access: Case study

    In this case study, discover how Caglayanlar, an automotive parts distributor, addressed the growing complexities of their security environment and established a program to better manage and secure remote access to their critical data.

    Download

  • Cloud risk report: Work from home edition

    The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • Is it time for more proactive endpoint security?

    Now more than ever, security teams must get ahead of adversaries and their threat campaigns. View this short video for an overview and demo of endpoint security with McAfee MVISION Insights – an analytics platform that strives to prioritize threats that matter, predict the impact and prescribe improvements before the threat occurs.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • Computer Weekly – 24 October 2017: Where will AI take us?

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

    Download

  • What can CIOs do about the skills shortage in ASEAN?

    In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.

    Download

  • July Essentials Guide on Cloud Computing

    This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.

    Download

  • Webinar: A 3-step approach to securing modern endpoints

    Reactionary approaches to endpoint security will eventually prove to be a recipe for disaster. Watch this short video to learn about McAfee’s modern endpoint security capabilities – which emphasize the importance of prioritizing threats, predicting their impacts and proactively defending them.

    Download

  • 3 ways to protect customers from ransomware

    Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • SIEM IT Decision Center- Checklist #2

    This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • Top Mobile Data Protection Best Practices

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

    Download

  • ESG Top Trends: How to secure cloud-native apps

    As organizations sprint to develop and deploy cloud-native apps, security often falls by the wayside. This may feel harmless at the time, but it vastly increases risk across the business. Watch this webinar – presented by ESG – to learn the top trends on cloud-native application protection and learn how McAfee can help secure these apps

    Download

  • An effective mobile device security policy

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

    Download

  • Video demo: Introducing MVision XDR

    Extended detection and response (XDR) are taking security operations by storm, but are they any better than tried-and-true EDR tools? Watch this short video for a closer look at the key features and capabilities of McAfee’s MVision XDR offering, and discover a virtual demo of the tool in-use.

    Download

  • Cybercrime: How it costs more than money

    $945 billion is the estimated monetary loss from cybercrime. This is a significant figure – but when you take a closer look, you’ll see that when it comes to organizational stability, efficiency, brand damage and trust, the cost of cybercrime goes far beyond what’s taken by criminals. View this report to learn the hidden costs of cybercrime.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • Mobile data protection best practices

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

    Download

  • Proactive security measures: How to prevent malware attacks

    Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.

    Download

  • Ransomware in the industrial sector

    Ransomware has steadily become one of the most prevalent and destructive cyberthreats, especially across the industrial sector. Read this research report to dive deeper into ransomware observations, research findings, common attack patterns, predictions, and more.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

    Download

  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Uber and Volkswagen: Handling ethics in IT

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • CW Benelux ezine August 2018

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

    Download

  • CIO Trends #7: Benelux

    In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

    Download

  • The importance of web security

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

    Download

  • Debunking APT myths: What it really means and what you can do about it

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

    Download

  • Automated security with EDR at the core

    Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.

    Download

  • Endpoint Management - IT handbook

    Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.

    Download