intel security

Results 276 - 300 of 448Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Oct 21, 2015
In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : mcafee, intel, security, dlp, securosis, networking, software development
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : mcafee, intel, security, content, protection, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : mcafee, intel, security, malware, cyber, threat, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : mcafee, intel, security, threat, strategy, enterprise applications
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Get free access ($195 value) to this Gartner research that identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users. CISOs should avoid these practices, and they can do so without sacrificing security posture or breaking the bank.
Tags : mcafee, intel, security, gartner, report, network, networking
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : mcafee, intel, security, cyber, criminal, networking, data management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : advanced threat defense, endpoint security, tech target research, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : gartner, buyers guide, endpoint security, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : aberdeen, free av, endpoint security, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : endpoint, security, vendor, iot, it management
     Intel Security
By: Intel Security     Published Date: Feb 16, 2016
Download a free copy ($1,995 value) of Gartner's 2016 Magic Quadrant for Endpoint Protection Platforms compliments of Intel Security. Gartner Magic Quadrants are based on rigorous, fact-based analysis backed up by a highly structured methodology. Read this report and find out why for the 13th consecutive year Gartner has positioned Intel Security as a leader in the Gartner Magic Quadrant for the Endpoint Protection Platforms (EPP) market report.
Tags : 
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations’ security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : siem, esg, jon oltsik, golden hour, attack detection and incident response
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : siem, incident response, sans, continuous monitoring
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This solution guide discusses how IT incident responders can unify the Protect, Detect, and Correct stages of managing threats in order to build a comprehensive security model that more efficiently combats targeted attacks.
Tags : threat management, adaptive security model, targeted attacks, agile, architecture, cybercrim, security connected framework, detection
     Intel Security
By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
     Intel Security
By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
     Intel Security
By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
     Intel Security
By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : security information, security connected framework, big security data, big data, log management, siem, security event management
     Intel Security
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com