McAfee. Company SummaryWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Company Summary

Overview: McAfee, is the world’s largest dedicated security technology company.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by McAfee..
Research offered by McAfee.

Hardening Database Security by McAfee.. August 09, 2011 - View this paper to learn how McAfee® Database Security Solution, a multitiered software solution that provides protection to all databases and data assets, warding off threats and eliminating vulnerabilities while providing compliance and maximising the efficiency of your operations.

  View Hardening Database Security research abstract

Magic Quadrant for Mobile Data Protection by McAfee.. September 07, 2010 - Mobile data protection (MDP) systems are crucial to for ensuring data privacy and compliance. This report explores the overall MDP market, ranking vendors against each other based on competitive criteria. View now to discover were each vendor ranks and which ones meet the needs and budget of your organisation.

  View Magic Quadrant for Mobile Data Protection research abstract

Magic Quadrant for Network Intrusion Prevention Systems by McAfee.. December 06, 2010 - This research paper analyzes the market, evolution, and use cases of network-based IPS. View now to explore IPS vendors in the market, and discover where they rank in Gartner’s Magic Quadrant.

  View Magic Quadrant for Network Intrusion Prevention Systems research abstract

McAfee Leads Criteria for Next-Generation IPS by McAfee.. February 01, 2012 - Discover how to mitigate today's increasingly sophisticated attacks with next-generation intrusion prevention (IPS). View now to explore how McAfee Network Security Platform 7 and an integrated network security framework can help deliver new levels of protection.

  View McAfee Leads Criteria for Next-Generation IPS research abstract

Mobilizing Business Applications with McAfee by McAfee.. November 21, 2011 - Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.

  View Mobilizing Business Applications with McAfee research abstract

Protecting Information from Insider Threats by McAfee.. January 30, 2012 - Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.

  View Protecting Information from Insider Threats research abstract

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by McAfee.. February 01, 2012 - The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.

  View Protecting the Network Perimeter: Controlling what gets through—into and out of your organization research abstract

Ten Steps to Protecting Your Sensitive Data by McAfee.. December 17, 2010 - Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps.

  View Ten Steps to Protecting Your Sensitive Data research abstract

The New Reality of Stealth Crimeware by McAfee.. November 21, 2011 - The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.

  View The New Reality of Stealth Crimeware research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts