Overview: McAfee, is the world’s largest dedicated security technology company.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by McAfee..
Research offered by McAfee.
Hardening Database Security by McAfee.. August 09, 2011 - View this paper to learn how McAfee® Database Security Solution, a multitiered software solution that provides protection to all databases and data assets, warding off threats and eliminating vulnerabilities while providing compliance and maximising the efficiency of your operations.
Magic Quadrant for Mobile Data Protection by McAfee.. September 07, 2010 - Mobile data protection (MDP) systems are crucial to for ensuring data privacy and compliance. This report explores the overall MDP market, ranking vendors against each other based on competitive criteria. View now to discover were each vendor ranks and which ones meet the needs and budget of your organisation.
Magic Quadrant for Network Intrusion Prevention Systems by McAfee.. December 06, 2010 - This research paper analyzes the market, evolution, and use cases of network-based IPS. View now to explore IPS vendors in the market, and discover where they rank in Gartner’s Magic Quadrant.
McAfee Leads Criteria for Next-Generation IPS by McAfee.. February 01, 2012 - Discover how to mitigate today's increasingly sophisticated attacks with next-generation intrusion prevention (IPS). View now to explore how McAfee Network Security Platform 7 and an integrated network security framework can help deliver new levels of protection.
Mobilizing Business Applications with McAfee by McAfee.. November 21, 2011 - Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Protecting Information from Insider Threats by McAfee.. January 30, 2012 - Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by McAfee.. February 01, 2012 - The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Ten Steps to Protecting Your Sensitive Data by McAfee.. December 17, 2010 - Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps.
The New Reality of Stealth Crimeware by McAfee.. November 21, 2011 - The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.