Research Library

Powered by

All Research Sponsored By:McAfee, Inc.

  • Androids in the Enterprise

    McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.

  • Operational Efficiencies of Proactive Vulnerability Management

    View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.

  • Mobility and Security: Dazzling Opportunities, Profound Challenges

    Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.

  • McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution

    This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.

  • Email Security in the Cloud: More Secure! Compliant! Less Expensive!

    Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.

  • McAfee Threats Report: Third Quarter 2010

    This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.