Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.
Gartner has positioned McAfee as a Leader in the Magic Quadrant for Intrusion Prevention Systems for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Download the report now.View whitepaper
This paper reviews five use cases, ranging from accidental policy violations to malicious thefts, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.View whitepaper
In a tangle of acronyms, applications, carriers, and features, your complex business voice systems are still about one thing: a simple conversation. It's where business starts and gets done.View whitepaper
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels, and strategic options.View whitepaper
When choosing cloud service providers, be sure to put them under the microscope by asking the right questions about how they secure your essential information.View whitepaper
Gartner Magic Quadrant for Intrusion Detection and Prevention Systems
Gartner has positioned McAfee as a Leader in the Magic Quadrant for Intrusion Prevention Systems for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Download the report now.
Aberdeen Report: Security Operations in Public Cloud Services
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and enterprises.
The Great Barrier Myth
A recent study reported that the number of North American companies utilizing SIP Trunking will grow from 38% to 58% in 2015.
Three Key Considerations in Securing the Software-Defined Data Center
The software-defined data center requires a new approach to security designed to leverage the benefits of a fully virtualized data center. In this white paper we examine the three most critical considerations in securing the SDCC.
Sustainable Security Operations: Optimize Processes and Tools
Fragmented and siloed security infrastructure is not sustainable against today’s threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Pervasive Data Protection
Data Protection is no longer just a problem residing at the endpoint. This ebook takes you through top use cases, ranging from visibility and control of cloud applications to demonstrating compliance across cloud environments.
SC Media eBook on Encryption
With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it is a security one.
SC Media eBook on Threat Intelligence
This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.
SC Media eBook on Ransomware
Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.
SC Media eBook on Internet of Things
IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.
SC Media eBook on Security Analytics
It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.
SC Media eBook on DDoS
Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.