Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:McAfee, Inc.

  • Enhancing End-to-End Cloud Security: Part 3

    This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.

  • Swedish Social Insurance Agency DoesBYOD Right

    This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security.

  • Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses

    NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.

  • Protect Identities in the Cloud Secure access to SaaS applications made easier

    This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.

  • A Buyer's Guide to Endpoint Protection Platforms

    This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  • E-Guide: Rethink Defense-In-Depth Security Model For BYOD

    This expert guide explains why endpoint defense-in-depth controls must assume the endpoint is compromised, and what paths you can take to get the most from your security system.

  • Rethink Defense-In-Depth Security Model For BYOD

    This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.

  • McAfee Tackles the Complexities of Endpoint Security

    This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  • The New Reality of Stealth Crimeware

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  • McAfee Endpoint Protection Suite

    This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.

  • A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life

    This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.

  • McAfee Endpoint Encryption

    This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.

  • McAfee Enterprise Mobility Management platform

    Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more.

  • The Evolving Landscape of Desktop Security

    This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

  • McAfee Application Control

    This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more.

  • Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist

    Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.

  • Log Management and SIEM: Build a Solid Foundation for Compliance

    This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.

  • Securing Medical Devices

    This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information.

  • Security Information and Event Management: Unique McAfee data management technology

    This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.

  • An effective mobile device security policy

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

  • Mobile data protection best practices

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

  • Risk and Compliance Outlook

    Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.

  • A Decision Maker’s Guide to GRC Solutions

    It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.

  • Top Mobile Data Protection Best Practices

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

  • Downloading Mobile Apps is Risky Business

    Learn how downloading mobile apps could introduce client-side vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.