Intel Security

View All Publications

Filter Content:

Cybersecurity Maturity = Visibility + Automation

Explore how cybersecurity teams in the sector are achieving more than most with integration and automation

Building Trust in a Cloudy Sky

We surveyed 1,400 IT professionals from 11 countries for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of global cloud adoption and security.

MOVE AntiVirus Advanced Security Integrated with VMware NSX

McAfee MOVE for AntiVirus has a track record of providing optimized antivirus protection for the virtual environment without impacting performance and agility.
Topics: Server & Storage Security

Securing the Hybrid Cloud

Most data centers today have a hybrid infrastructure that spans physical, virtualized and cloud deployments, both on premises and off premises. Discover how to keep up with this evolving landscape and provide an agile IT infrastructure to help meet business expansion goals.

Sustainable Advantage in Security with Cloud Workload Discovery

Intel Security's cloud workload security solutions are built and enhanced to provide sustainable advantage while optimizing investment. Cloud Workload Discovery increases this advantage to discover, assess, and remediate threats targeting the cloud.

How to Protect Against Ransomware

Learn how Intel Security products leverage a number of technologies that help prevent ransomware.
Topics: McAfee Labs

McAfee Labs Quarterly Threat Report December 2016

Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.
Topics: McAfee Labs

‘Trojanized’ Legitimate Software

This solution brief details how to configure Intel Security products to help prevent Trojan infections and mitigate their propagation.
Topics: McAfee Labs

Building & Maintaining a Business Continuity Program

Business continuity planning is a critical function that involves many different personnel and departments over multiple phases. As with many business continuity programs, an iterative process is most effective in developing a refined set of procedures and plans.
Topics: Foundstone

McAfee Labs 2017 Threats Predictions

Our researchers offer long-lens predictions about cloud and internet of things (IoT) threats, laws, and vendor responses. They also make specific predictions about threats activity in 2017, including ransomware, vulnerabilities of all kinds, and the use of threat intelligence to improve defenses.
Topics: McAfee Labs