McAfee White Papers
IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.
The rapid shift to virtualized and cloud-based infrastructure, both internally and hosted within cloud service provider environments, opens new layers of risk to IT resources. In this paper, we break down the foundations of a virtual infrastructure, examine security tools and controls that are available for these layers, present the pros and cons of different approaches, and take a look at some new technology that may allow security teams to implement more flexible and capable protection models in virtual and cloud-based datacenters.
SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
Migrating data to the cloud has led to a hybrid system with both physical and virtual systems, often leaving precious data exposed. Learn how McAfee Sever Security Suite Essentials secures data and closes exposure gaps.
Safeguarding the Next-Generation Data Center
Use of virtual and cloud servers has exploded. Unfortunately, security often lags behind. McAfee recommends looking at innovative solutions in order to erect a protective perimeter around your virtual and cloud servers.
Aberdeen: Securing the Evolving Datacenter
This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.
Evolving Your Data Center? Evolve Your Data Center Security
Traditional technologies for securing the evolving enterprise data center are being adapted by leading solution providers to work across a broad range of datacenter deployment scenarios. Enterprise buyers should look for solution providers that have explicitly adapted their solutions to work together in a layered, defense-in-depth approach for data center security.
Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques
Sophisticated cybercriminals are using advanced evasion techniques (AET), which deliver an exploit or malicious content into a vulnerable target so that the traffic looks normal, to bypass most existing security solutions. McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect this type of attack. It has been successfully tested against more than 800 million AET variants.
The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)
In early 2014, McAfee commissioned research group Vanson Bourne to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them. The findings, summarized in this executive summary, show that most respondents do not fully understand AETs and, as a consequence, are not deploying comprehensive security solutions to thwart them.
Demand More, Get the Most from the Move to a Next-Generation Firewall
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Protect Against Advanced Evasion Techniques
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.
Advanced Evasion Techniques for Dummies
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.
Advanced Attacks Demand New Defenses
Security threat and response is a vicious circle of escalating (and increasingly cagey) attacks and sophisticated (and increasingly costly) defenses. The latest generation of malware includes deviously creative evasive techniques crafted to exploit ambiguities in the Internet's underlying technology, flaws in network software stacks, and limitations of security appliances. In this report, we discuss these techniques, how IT teams can test their level of exposure, and how to detect and block attacks using advanced packet normalization.