McAfee, Inc. Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
McAfee, Inc.

Overview: McAfee, Inc., the leader in intrusion prevention and security risk management, proactively secures systems and networks, worldwide. McAfee delivers unmatched security expertise, manageability, and proven attack prevention.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by McAfee, Inc..
Research offered by McAfee, Inc.

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.. December 02, 2008 - Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall.

  View 15 Minutes to a Secure Business: Daily Practices for IT Security Management research abstract

A Buyer's Guide to Endpoint Protection Platforms by McAfee, Inc.. April 17, 2012 - This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  View A Buyer's Guide to Endpoint Protection Platforms research abstract

A Decision Maker’s Guide to GRC Solutions by McAfee, Inc.. November 10, 2011 - It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.

  View A Decision Maker’s Guide to GRC Solutions research abstract

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life by McAfee, Inc.. May 30, 2013 - This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.

  View A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life research abstract

Androids in the Enterprise by McAfee, Inc.. November 09, 2011 - McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.

  View Androids in the Enterprise research abstract

Antispam in the Midmarket: Trends and Strategies by McAfee, Inc.. April 2008 - Listen in as Stephen Cobb details the latest spam challenges CIOs in the midmarket are facing. Learn more about the latest antispam techniques and trends that you can use to fight spam in this expert podcast.

  View Antispam in the Midmarket: Trends and Strategies research abstract

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses by McAfee, Inc.. August 02, 2013 - NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.

  View Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses research abstract

Downloading Mobile Apps is Risky Business by McAfee, Inc.. November 09, 2011 - Learn how downloading mobile apps could introduce client-side vulnerabilities.

  View Downloading Mobile Apps is Risky Business research abstract

E-Guide: Rethink Defense-In-Depth Security Model For BYOD by McAfee, Inc.. July 23, 2013 - This expert guide explains why endpoint defense-in-depth controls must assume the endpoint is compromised, and what paths you can take to get the most from your security system.

  View E-Guide: Rethink Defense-In-Depth Security Model For BYOD research abstract

Email Security for Midsize Organizations by McAfee, Inc.. August 11, 2009 - Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.

  View Email Security for Midsize Organizations research abstract

Email Security in the Cloud: More Secure! Compliant! Less Expensive! by McAfee, Inc.. April 01, 2010 - Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.

  View Email Security in the Cloud: More Secure! Compliant! Less Expensive! research abstract

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.. November 09, 2011 - In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work.

  View Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security research abstract

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.. August 23, 2011 - Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk.

  View Employee Use of Personal Devices: Managing risk by balancing privacy and security research abstract

Enhancing End-to-End Cloud Security: Part 3 by McAfee, Inc.. September 12, 2013 - This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.

  View Enhancing End-to-End Cloud Security: Part 3 research abstract

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by McAfee, Inc.. November 02, 2010 - For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance.

  View Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution research abstract

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure by McAfee, Inc.. November 09, 2011 - This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.

  View Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure research abstract

Log Management and SIEM: Build a Solid Foundation for Compliance by McAfee, Inc.. November 20, 2012 - This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.

  View Log Management and SIEM: Build a Solid Foundation for Compliance research abstract

Managing the Cost and Complexity of Compliance through Governance by McAfee, Inc.. October 08, 2009 - Read this presentation transcript for a discussion on risk management, corporate governance, regulatory compliance, and information quality presented by speaker Laurence Anker.

  View Managing the Cost and Complexity of Compliance through Governance research abstract

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc.. November 23, 2009 - This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time.

  View McAfee 15 Minutes to a Secure Business: Daily Security Practices research abstract

McAfee Application Control by McAfee, Inc.. December 31, 2012 - This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more.

  View McAfee Application Control research abstract

McAfee Cloud Security Platform by McAfee, Inc.. August 11, 2011 - View this paper to explore how McAfee® Cloud Security Platform can help organizations take advantage of the cloud safely and confidently by extending existing security practices and policies to data flowing to and from the cloud.

  View McAfee Cloud Security Platform research abstract

McAfee Email and Web Security Appliance Trial by McAfee, Inc.. September 02, 2009 - Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.

  View McAfee Email and Web Security Appliance Trial research abstract

McAfee Endpoint Encryption by McAfee, Inc.. May 30, 2013 - This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.

  View McAfee Endpoint Encryption research abstract

McAfee Endpoint Protection Suite by McAfee, Inc.. May 31, 2013 - This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.

  View McAfee Endpoint Protection Suite research abstract

McAfee Enterprise Mobility Management platform by McAfee, Inc.. May 30, 2013 - Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more.

  View McAfee Enterprise Mobility Management platform research abstract

McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution by McAfee, Inc.. August 18, 2011 - This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.

  View McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution research abstract

McAfee Initiative to Fight Cybercrime by McAfee, Inc.. December 2008 - Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.

  View McAfee Initiative to Fight Cybercrime research abstract

McAfee Security Journal by McAfee, Inc.. December 2008 - This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception.

  View McAfee Security Journal research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc.. December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc.. December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc.. March 29, 2013 - This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  View McAfee Tackles the Complexities of Endpoint Security research abstract

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc.. December 02, 2010 - This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.

  View McAfee Threats Report: Third Quarter 2010 research abstract

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite by McAfee, Inc.. December 02, 2008 - Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.

  View McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite research abstract

Mobile Security Report 2009 by McAfee, Inc.. December 07, 2009 - Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future.

  View Mobile Security Report 2009 research abstract

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab by McAfee, Inc.. November 09, 2011 - For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.

  View Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab research abstract

Mobility and Security: Dazzling Opportunities, Profound Challenges by McAfee, Inc.. August 23, 2011 - Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.

  View Mobility and Security: Dazzling Opportunities, Profound Challenges research abstract

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests by McAfee, Inc.. March 09, 2009 - In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.

  View Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests research abstract

Network Testing Labs Review: Make Internet Risks and Perils Disappear by McAfee, Inc.. June 30, 2009 - Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.

  View Network Testing Labs Review: Make Internet Risks and Perils Disappear research abstract

Operational Efficiencies of Proactive Vulnerability Management by McAfee, Inc.. August 29, 2011 - View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.

  View Operational Efficiencies of Proactive Vulnerability Management research abstract

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.. September 29, 2009 - Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits.

  View Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today research abstract

Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture by McAfee, Inc.. October 01, 2009 - In this executive roundtable discussion, Representatives from McAfee, Qualcomm, and HP discuss what keeps security pros up at night. New sophisticated attacks in the threat landscape are changing security needs. Read this presentation transcript to learn more about an integrated approach to handling these new needs.

  View Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture research abstract

Presentation Transcript: State of New York Government Case Study by McAfee, Inc.. October 14, 2009 - Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection.

  View Presentation Transcript: State of New York Government Case Study research abstract

Protect Identities in the Cloud Secure access to SaaS applications made easier by McAfee, Inc.. August 02, 2013 - This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.

  View Protect Identities in the Cloud Secure access to SaaS applications made easier research abstract

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by McAfee, Inc.. March 08, 2010 - This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.

  View Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization research abstract

Risk and Compliance Outlook by McAfee, Inc.. November 10, 2011 - Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.

  View Risk and Compliance Outlook research abstract

Say “Yes” to Mobile Devices by McAfee, Inc.. November 09, 2011 - Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.

  View Say “Yes” to Mobile Devices research abstract

Securing Medical Devices by McAfee, Inc.. May 25, 2012 - This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information.

  View Securing Medical Devices research abstract

Securing the Next-Generation Data Center by McAfee, Inc.. August 11, 2011 - Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation.

  View Securing the Next-Generation Data Center research abstract

Security Information and Event Management: Unique McAfee data management technology by McAfee, Inc.. March 23, 2012 - This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.

  View Security Information and Event Management: Unique McAfee data management technology research abstract

Seven Design Requirements for Web 2.0 Threat Protection by McAfee, Inc.. April 02, 2009 - Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.

  View Seven Design Requirements for Web 2.0 Threat Protection research abstract

Solution Brief: Data Protection for Midsize Organizations by McAfee, Inc.. August 19, 2009 - Data is the lifeblood of any organisation, and one of the five greatest threat vectors faced by a midsise organisation. Whether you want to address all five areas or concentrate on data protection, McAfee has proven products and a dedicated focus to meet the requirements of your organisation.

  View Solution Brief: Data Protection for Midsize Organizations research abstract

Solution Brief: Total Protection for Secure Business by McAfee, Inc.. September 01, 2009 - Total Protection for Secure Business. Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.

  View Solution Brief: Total Protection for Secure Business research abstract

Swedish Social Insurance Agency DoesBYOD Right by McAfee, Inc.. August 02, 2013 - This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security.

  View Swedish Social Insurance Agency DoesBYOD Right research abstract

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by McAfee, Inc.. November 04, 2011 - While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  

  View Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention research abstract

The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too by McAfee, Inc.. August 08, 2011 - New technologies like the cloud come with both risks and rewards. But while many question the potential security risks, they fail to realize that the cloud isn’t just good for scaling a business’s computer power, it’s also a highly efficient way to scale security and protection. View this brief to explore the benefits of security from the cloud.

  View The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too research abstract

The Evolving Landscape of Desktop Security by McAfee, Inc.. May 30, 2013 - This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

  View The Evolving Landscape of Desktop Security research abstract

The New Reality of Stealth Crimeware by McAfee, Inc.. May 31, 2013 - This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  View The New Reality of Stealth Crimeware research abstract

The State of Email Security by McAfee, Inc.. April 2008 - Anti-spam is still plaguing CIOs in the midmarket. Controlling anti-spam and shoring up email security are two issues that CIOs have to address. In this webcast Peter Brockmann explains possible methods that can be used to address the issue.

  View The State of Email Security research abstract

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis by McAfee, Inc.. August 29, 2009 - This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study.

  View The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis research abstract

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager by McAfee, Inc.. October 04, 2010 - Some IT and security teams wonder if automated vulnerability management is important, given pressing demands for other IT projects and investments. Why not stick with manual processes or traditional scanners? It is possible that McAfee® Vulnerability Manager may not be right for your organization. Use this simple evaluation checklist to find out.

  View Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager research abstract

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.. March 09, 2010 - Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution.

  View Top 10 Steps to Protecting Your Organization’s Privacy Data research abstract

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.. December 07, 2009 - Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often.

  View Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare research abstract

Virtual Criminology Report Cybercrime versus Cyberlaw by McAfee, Inc.. December 2008 - Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c...

  View Virtual Criminology Report Cybercrime versus Cyberlaw research abstract

Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence by McAfee, Inc.. December 02, 2008 - Cybercrime's new techniques demand a new weapon. Read this white paper to learn how this real-time network integrates threat disciplines and introduces new detection and response models that will provide effective protection as the malware wars escalate.

  View Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts