Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Company Summary
McAfee, Inc.

Overview: McAfee, Inc., the leader in intrusion prevention and security risk management, proactively secures systems and networks, worldwide. McAfee delivers unmatched security expertise, manageability, and proven attack prevention.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by McAfee, Inc.
Research offered by McAfee, Inc.

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc. . December 02, 2008 - Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall.

  View 15 Minutes to a Secure Business: Daily Practices for IT Security Management research abstract

A Buyer's Guide to Endpoint Protection Platforms by McAfee, Inc. . April 17, 2012 - This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  View A Buyer's Guide to Endpoint Protection Platforms research abstract

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life by McAfee, Inc. . May 30, 2013 - This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.

  View A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life research abstract

Antispam in the Midmarket: Trends and Strategies by McAfee, Inc. . April 2008 - Listen in as Stephen Cobb details the latest spam challenges CIOs in the midmarket are facing. Learn more about the latest antispam techniques and trends that you can use to fight spam in this expert podcast.

  View Antispam in the Midmarket: Trends and Strategies research abstract

Email Security for Midsize Organizations by McAfee, Inc. . August 11, 2009 - Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.

  View Email Security for Midsize Organizations research abstract

Email Security in the Cloud: More Secure! Compliant! Less Expensive! by McAfee, Inc. . April 01, 2010 - Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.

  View Email Security in the Cloud: More Secure! Compliant! Less Expensive! research abstract

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by McAfee, Inc. . November 02, 2010 - For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance.

  View Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution research abstract

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure by McAfee, Inc. . November 09, 2011 - This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.

  View Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure research abstract

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc. . November 23, 2009 - This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time.

  View McAfee 15 Minutes to a Secure Business: Daily Security Practices research abstract

McAfee Cloud Security Platform by McAfee, Inc. . August 11, 2011 - View this paper to explore how McAfee® Cloud Security Platform can help organizations take advantage of the cloud safely and confidently by extending existing security practices and policies to data flowing to and from the cloud.

  View McAfee Cloud Security Platform research abstract

McAfee Email and Web Security Appliance Trial by McAfee, Inc. . September 02, 2009 - Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.

  View McAfee Email and Web Security Appliance Trial research abstract

McAfee Endpoint Protection Suite by McAfee, Inc. . May 31, 2013 - This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.

  View McAfee Endpoint Protection Suite research abstract

McAfee Initiative to Fight Cybercrime by McAfee, Inc. . December 2008 - Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.

  View McAfee Initiative to Fight Cybercrime research abstract

McAfee Security Journal by McAfee, Inc. . December 2008 - This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception.

  View McAfee Security Journal research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc. . December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc. . December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc. . March 29, 2013 - This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc. . December 02, 2010 - This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.

  View McAfee Threats Report: Third Quarter 2010 research abstract

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite by McAfee, Inc. . December 02, 2008 - Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.

  View McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite research abstract

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests by McAfee, Inc. . March 09, 2009 - In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.

  View Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests research abstract

Network Testing Labs Review: Make Internet Risks and Perils Disappear by McAfee, Inc. . June 30, 2009 - Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.

  View Network Testing Labs Review: Make Internet Risks and Perils Disappear research abstract

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc. . September 29, 2009 - Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits.

  View Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today research abstract

Presentation Transcript: State of New York Government Case Study by McAfee, Inc. . October 14, 2009 - Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection.

  View Presentation Transcript: State of New York Government Case Study research abstract

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by McAfee, Inc. . March 08, 2010 - This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.

  View Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization research abstract

Rethink Defense-In-Depth Security Model For BYOD by McAfee, Inc. . July 03, 2013 - This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.

  View Rethink Defense-In-Depth Security Model For BYOD research abstract

Seven Design Requirements for Web 2.0 Threat Protection by McAfee, Inc. . April 02, 2009 - Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.

  View Seven Design Requirements for Web 2.0 Threat Protection research abstract

Solution Brief: Data Protection for Midsize Organizations by McAfee, Inc. . August 19, 2009 - Data is the lifeblood of any organisation, and one of the five greatest threat vectors faced by a midsise organisation. Whether you want to address all five areas or concentrate on data protection, McAfee has proven products and a dedicated focus to meet the requirements of your organisation.

  View Solution Brief: Data Protection for Midsize Organizations research abstract

Solution Brief: Total Protection for Secure Business by McAfee, Inc. . September 01, 2009 - Total Protection for Secure Business. Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.

  View Solution Brief: Total Protection for Secure Business research abstract

The Evolving Landscape of Desktop Security by McAfee, Inc. . May 30, 2013 - This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

  View The Evolving Landscape of Desktop Security research abstract

The New Reality of Stealth Crimeware by McAfee, Inc. . May 31, 2013 - This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  View The New Reality of Stealth Crimeware research abstract

The State of Email Security by McAfee, Inc. . April 2008 - Anti-spam is still plaguing CIOs in the midmarket. Controlling anti-spam and shoring up email security are two issues that CIOs have to address. In this webcast Peter Brockmann explains possible methods that can be used to address the issue.

  View The State of Email Security research abstract

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc. . March 09, 2010 - Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution.

  View Top 10 Steps to Protecting Your Organization’s Privacy Data research abstract

Virtual Criminology Report Cybercrime versus Cyberlaw by McAfee, Inc. . December 2008 - Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c...

  View Virtual Criminology Report Cybercrime versus Cyberlaw research abstract

Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence by McAfee, Inc. . December 02, 2008 - Cybercrime's new techniques demand a new weapon. Read this white paper to learn how this real-time network integrates threat disciplines and introduces new detection and response models that will provide effective protection as the malware wars escalate.

  View Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence research abstract

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts