All Research Sponsored By:McAfee, Inc.

6 Steps to Mastering Endpoint Protection
WHITE PAPER: Let these six steps guide your company towards reliable protection to stay ahead of attackers.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Case Study: U.S. Bank Minimizes Security Risk
CASE STUDY: When this bank realized the risk of network security incidents, it made sure to find the right solution. Learn more.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Disrupting the Disruptors, Art or Science? Executive Summary
WHITE PAPER: Threat hunting is an ongoing development to lead companies in successful security investigations. Find out more.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Secrets of Successful Threat Hunters Infographic
WHITE PAPER: Wondering how threat hunters perform successful security threat investigations to disrupt attackers? Look no further.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Integrate, Orchestrate, and Expedite Security Operations
WHITE PAPER: Make security operations easier to manage with an initiative meant to improve protection and faster performance.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

ESG Infographic: Run With Change, Not Away From It
WHITE PAPER: Understand why companies are struggling more than ever with cybersecurity analytics and operations.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Case Study: Cutting Costs and Combating Ransomware
CASE STUDY: Learn how this company is better managing cyber threats to take down one of its biggest challenges: ransomware.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Chaos in the Cybersecurity Operations and Analytics Realm
ANALYST REPORT: Dive into an overview of cybersecurity operations and analytics, its challenges and how to overcome these obstacles.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

McAfee Integrated Threat Defense Solution Executive Summary
ANALYST REPORT: Learn about key features/functions of a solution designed to enhance your company's defense against security threats.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Automation and Orchestration Solution to SOC Overload
WHITE PAPER: It's all in the statistics. Get an overview of the threat management approach used to accelerate business operations.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management

Disrupting the Disruptors, Art or Science?
ANALYST REPORT: Throw your attackers a curveball. Learn how threat hunters work to protect their organization's security infrastructure.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TOPICS:  IT Management

Cybersecurity: For Defenders, It's About Time
ANALYST REPORT: Get a deeper understanding of why defenders need time on their side when fighting against cybersecurity attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TOPICS:  IT Management

Machine Learning Raises Security Teams to the Next Level
ANALYST REPORT: Cyberattacks are a huge danger that cause immense damage. Lower risk for an attack with the right security strategy.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TOPICS:  IT Management

Petya Ransomware: How McAfee Can Help
TECHNICAL ARTICLE: Petya Ransomware wreaks havoc throughout networks and leaves machines unusable. Protect yourself with McAfee.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

TOPICS:  IT Management

McAfee Labs Threats Report: June 2017
WHITE PAPER: Learn about evasion techniques, steganography in the digital world and Fareit in the latest quarterly threats report.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

TOPICS:  IT Management

WannaCry Ransomware
WHITE PAPER: The WannaCry ransomeware family has swept the globe. McAfee can help.
Posted: 17 May 2017 | Published: 17 May 2017


Cloud Ubiquity-it’s coming, but not yet!
WHITE PAPER: Cloud ubiquity is expected to happen around April 2018. See the obstacle impacting full cloud migration and protection.
Posted: 15 May 2017 | Published: 15 May 2017


Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security
WHITE PAPER: Human analysts are inundated with the volume of security intelligence. Adopt machine learning for improved capabilities.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management

Vident Health: More Than the Sum of its Parts
VIDEO: Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management

Kinetic IT
VIDEO: Hear from Kinetic IT's Security Service Director on the successful fourteen year partnership with McAfee.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management

Evolution of the Security Operations Center
VIDEO: Hear an overview on how SOC is defined within the industry, a history of SOCs and model options for your organization.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management

Security Analytics Team of Rivals
WHITE PAPER: Advanced attacks cannot be detected with outdated technologies. Learn how to craft a Security Analytics Team of Rivals.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management

Building a Sustainable Security Operations Model
WHITE PAPER: Threats can be complex and it is difficult to isolate signals from noise. Integrate for sustainablesecurity operations.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management

Sustainable Security Operations
WHITE PAPER: Security issues and the cost of compliance continue to increase. Optimize to get the most out of your team and budget.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management

Security Information and Event Management (SIEM) Orchestration
WHITE PAPER: Learn how to leverage SIEM to detect attacks sooner and quickly take action to minimize the impact of advanced threats.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management