McAfee, Inc. Company ReportWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Report
McAfee, Inc.
Company URL: http://www.mcafee.com

Overview:
McAfee, Inc., the leader in intrusion prevention and security risk management, proactively secures systems and networks, worldwide. McAfee delivers unmatched security expertise, manageability, and proven attack prevention.

> Return to Search Results

Company Information
Public or private company: Private
Year the company was founded: 1968

Company Locations
Corporate Headquarters
This location offers:
Corporate Headquarters
3965 Freedom Circle
Santa Clara, California 95054
United States

Solutions and Research
Research 15 Minutes to a Secure Business: Daily Practices for IT Security Management
A Buyer's Guide to Endpoint Protection Platforms
A Decision Maker’s Guide to GRC Solutions
A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
An effective mobile device security policy
Androids in the Enterprise
Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
Downloading Mobile Apps is Risky Business
E-Guide: Rethink Defense-In-Depth Security Model For BYOD
Email Security for Midsize Organizations
Email Security in the Cloud: More Secure! Compliant! Less Expensive!
Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security
Employee Use of Personal Devices: Managing risk by balancing privacy and security
Enhancing End-to-End Cloud Security: Part 3
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution
Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
Log Management and SIEM: Build a Solid Foundation for Compliance
Managing the Cost and Complexity of Compliance through Governance
McAfee 15 Minutes to a Secure Business: Daily Security Practices
McAfee Application Control
McAfee Cloud Security Platform
McAfee Email and Web Security Appliance Trial
McAfee Endpoint Encryption
McAfee Endpoint Protection Suite
McAfee Enterprise Mobility Management platform
McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution
McAfee Initiative to Fight Cybercrime
McAfee Security Journal
McAfee Tackles the Complexities of Endpoint Security
McAfee Tackles the Complexities of Endpoint Security
McAfee Tackles the Complexities of Endpoint Security
McAfee Threats Report: Third Quarter 2010
McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite
Mobile data protection best practices
Mobile Security Report 2009
Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
Mobility and Security: Dazzling Opportunities, Profound Challenges
Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests
Network Testing Labs Review: Make Internet Risks and Perils Disappear
Operational Efficiencies of Proactive Vulnerability Management
Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today
Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture
Presentation Transcript: State of New York Government Case Study
Protect Identities in the Cloud Secure access to SaaS applications made easier
Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization
Remediating IT vulnerabilities: Quick hits for risk prioritization
Rethink Defense-In-Depth Security Model For BYOD
Risk and Compliance Outlook
Say “Yes” to Mobile Devices
Securing Medical Devices
Securing the Next-Generation Data Center
Security Information and Event Management: Unique McAfee data management technology
Seven Design Requirements for Web 2.0 Threat Protection
Solution Brief: Data Protection for Midsize Organizations
Solution Brief: Total Protection for Secure Business
Swedish Social Insurance Agency DoesBYOD Right
Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too
The Evolving Landscape of Desktop Security
The New Reality of Stealth Crimeware
The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis
Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager
Top 10 Steps to Protecting Your Organization’s Privacy Data
Top Mobile Data Protection Best Practices
Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare
Virtual Criminology Report Cybercrime versus Cyberlaw
Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence
 

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts