

The three challenges you’re likely facing – cost and complexity, defenses that can’t keep up, and overburdened staff – drive ten real and tangible problems that require lots of time and resources. Endpoint security is a challenge. Defenses aren’t keeping up, and security staff is stretched...
Published: Jan 11, 2019


Global enterprises have a gaping hole in their security strategy for defending against rampant cyber attacks on the trust established by cryptographic keys and digital certificates. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot...
Published: Jul 01, 2014


Although endpoints are typically the targets, ransomware can spread rapidly across a network in spite of layers of security and impact the entire organisation. Ransomware threatens to derail network operations teams’ efforts to ensure optimal performance and security.
The cost to an organisation can be significant...
Published: Feb 12, 2018


Today’s organizations are highly vulnerable to security threats related to privileged identities—that is, the accounts of system administrators, database managers and others with elevated access to critical IT resources.
Because of the overarching access of these users, their privileged identities have...
Published: Sep 11, 2013


In recent years, the network firewall has evolved from a relatively simple security appliance to assume a prominent role in the enterprise’s cybercrime defenses. Next-generation firewalls (NGFWs) represent the state of the art, incorporating features such as intrusion prevention, anti-malware, and deep packet inspection...
Published: Apr 27, 2015


This white paper articulates the business benefits derived by companies that have deployed NGFW. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy,...
Published: Apr 27, 2015


Many organizations today are using security event management tools to gather, correlate and report on security data within their environments.
Although some are still using traditional log management tools, the need for more effective event intelligence and deeper analysis of activity within the environment is driving...
Published: Apr 16, 2014


In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Published: Oct 14, 2014


In a recent analysis of threat management, FireEye learned that large enterprise companies rely on security personnel to fulfill multiple roles and responsibilities – an expectation that can prove disastrous when it comes to finding and escalating a critical alert.
This special report is based on a worldwide...
Published: Jan 29, 2016


The need for robust datacenter security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise...
Published: May 08, 2014


Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets. Learn new insights into insider threats and how you can use Privileged Identity Management and Data Protection capabilities to help...
Published: Jan 06, 2014


This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Published: Apr 24, 2014


Virtualization is helping organizations utilize their data center hardware infrastructure more effectively, leading to reduction in costs, and improvements in operational efficiencies.
However, as organizations evolve from traditional data centers to virtualised and cloud computing environments, security architectures...
Published: May 03, 2017


If you are responsible for network security, you need to understand how to prevent attacks by eliminating network weaknesses that leave your business exposed and at risk.
Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this newly revised, 6-part...
Published: Aug 08, 2014