Featured

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Gartner Magic Quadrant for Intrusion Detection and Prevention Systems

Gartner has positioned McAfee as a Leader in the Magic Quadrant for Intrusion Prevention Systems for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Download the report now.

Recommended

Aberdeen Report: Security Operations in Public Cloud Services

Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and enterprises.

The Great Barrier Myth

A recent study reported that the number of North American companies utilizing SIP Trunking will grow from 38% to 58% in 2015.

Three Key Considerations in Securing the Software-Defined Data Center

The software-defined data center requires a new approach to security designed to leverage the benefits of a fully virtualized data center. In this white paper we examine the three most critical considerations in securing the SDCC.

Sustainable Security Operations: Optimize Processes and Tools

Fragmented and siloed security infrastructure is not sustainable against today’s threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.

Pervasive Data Protection

Data Protection is no longer just a problem residing at the endpoint. This ebook takes you through top use cases, ranging from visibility and control of cloud applications to demonstrating compliance across cloud environments.

eBooks

SC Media eBook on Encryption

With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it is a security one.

SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

SC Media eBook on Ransomware

Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.

SC Media eBook on Internet of Things

IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.

SC Media eBook on Security Analytics

It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.

SC Media eBook on DDoS

Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.

SC Media eBook on Insider Threat

Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others.