UBM: TECH DIGITAL RESOURCE LIBRARY

McAfee

McAfee is the world's largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the Web securely. With our unmatched security expertise and commitment to innovation, McAfee helps home users, businesses, the public sector and service providers to comply with regulations, protect data, prevent disruptions, identify vulnerabilities and continuously monitor and improve their security. Our products are unique in how they work together to make security affordable and manageable. These days, the threats are tougher, and the perpetrators are trickier. But as we have for more than 20 years, McAfee delivers superior protection that is trusted by millions of people.

Our Website: http://www.mcafee.com


Whitepaper: Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

by McAfeeJul 01, 2014

Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations.

Most network security devices are not capable of detecting them. While many


Whitepaper: 10 Best Practices for URL Filtering

by McAfeeJul 01, 2014

URL filtering, which blocks users from accessing websites that are malicious or erode productivity, is an essential security best practice. Discover 10 ways to make this easier and more effective to implement.


Whitepaper: Advanced Evasion Techniques for Dummies

by McAfeeJul 01, 2014

This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find


Whitepaper: Augmented VPN

by McAfeeFeb 24, 2014

A Virtual Private Network delivers the best return on investment in securing communications. However, the lack of reliability of VPN links is risky for critical communication within organizations. Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel. Augmented VPN provides a simple and cost effective way to


Whitepaper: Protect Against Advanced Evasion Techniques

by McAfeeFeb 24, 2014

The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). Although evasions have been documented extensively in the last fifteen years, security vendors have systematically ignored the significance of evasions. Some vendors have even downplayed the threat posed by evasions as being purely theoretical. Yet this debate misses the bigger issue:


Whitepaper: Advanced Evasion Techniques for Dummies

by McAfeeFeb 01, 2014

This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find


Whitepaper: Demand More white paper

by McAfeeFeb 01, 2014

As next-generation firewall (NGFW) technology becomes more mainstream, it is time to review the advanced capabilities and features that separate the leaders from the laggards. At its most basic, the consensus of a NGFW definition would include these capabilities - standard firewall features like stateful inspection and network address translation, integrated intrusion prevention, application awareness and some level of intelligence and integration with vulnerability and reputation databases.


Whitepaper: Security Connected from McAfee

by McAfeeOct 06, 2013

Taking advantage of an integrated framework such as Security Connected and using COTS rather than GOTS technologies produces major efficiency gains. It is possible to get comprehensive cybersecurity that provides real-time threat visibility and protection at a reasonable cost. The right integrated COTS approach to security can meet all of a government agency's requirements - optimizing its security posture, reducing its spend, simplifying the operation, and meeting government cybersecurity


Whitepaper: ESG: Prudent Approach to Next-Generation Network Security

by McAfeeOct 06, 2013

Moving forward, CISOs must realize that new architectures and technologies demand a more careful and pragmatic research, evaluation, and purchasing strategy. Third-party lab testing and market studies should be considered as they have been in the past, but next-generation network security could represent a paradigm shift in network security architecture and overall enterprise security protection. As such, CISOs must broaden their evaluation criteria, maintain an open mind, and make educated


Whitepaper: Next-Generation Network IPS

by McAfeeOct 06, 2013

This white paper discusses how the McAfee Network Security Platform can help organizations unify network security across physical and virtual environments, streamline security operations, and protect themselves from emerging malware, zero-day attacks, denial-of-service exploits and advanced targeted attacks.