ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:McAfee, Inc.

  • Petya Ransomware: How McAfee Can Help

    Petya Ransomware wreaks havoc throughout networks and leaves machines unusable. Protect yourself with McAfee.

  • McAfee Labs Threats Report: June 2017

    Learn about evasion techniques, steganography in the digital world and Fareit in the latest quarterly threats report.

  • Optimize Your SIEM Operations

    Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.

  • Resource Center: Stop Threats and Prevent Data Loss

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Petya Ransomware: Attack Analysis

    A new variant in the Petya Ransomware introduced a new level of maliciousness. See how machines are being infected.

  • Androids in the Enterprise

    McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.

  • Operational Efficiencies of Proactive Vulnerability Management

    View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.

  • Mobility and Security: Dazzling Opportunities, Profound Challenges

    Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.

  • McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution

    This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.

  • Email Security in the Cloud: More Secure! Compliant! Less Expensive!

    Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.

  • McAfee Threats Report: Third Quarter 2010

    This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.