Skip the navigation

McAfee White Papers

IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.

SANS: Next-Generation Datacenters = Next-Generation Security

The rapid shift to virtualized and cloud-based infrastructure, both internally and hosted within cloud service provider environments, opens new layers of risk to IT resources. In this paper, we break down the foundations of a virtual infrastructure, examine security tools and controls that are available for these layers, present the pros and cons of different approaches, and take a look at some new technology that may allow security teams to implement more flexible and capable protection models in virtual and cloud-based datacenters.

Sponsor: McAfee


 

SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Migrating data to the cloud has led to a hybrid system with both physical and virtual systems, often leaving precious data exposed. Learn how McAfee Sever Security Suite Essentials secures data and closes exposure gaps.

Sponsor: McAfee


 

Safeguarding the Next-Generation Data Center

Use of virtual and cloud servers has exploded. Unfortunately, security often lags behind. McAfee recommends looking at innovative solutions in order to erect a protective perimeter around your virtual and cloud servers.

Sponsor: McAfee


 

Aberdeen: Securing the Evolving Datacenter

This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.

Sponsor: McAfee


 

Evolving Your Data Center? Evolve Your Data Center Security

Traditional technologies for securing the evolving enterprise data center are being adapted by leading solution providers to work across a broad range of datacenter deployment scenarios. Enterprise buyers should look for solution providers that have explicitly adapted their solutions to work together in a layered, defense-in-depth approach for data center security.

Sponsor: McAfee


 

Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques

Sophisticated cybercriminals are using advanced evasion techniques (AET), which deliver an exploit or malicious content into a vulnerable target so that the traffic looks normal, to bypass most existing security solutions. McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect this type of attack. It has been successfully tested against more than 800 million AET variants.

Sponsor: McAfee


 

The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)

In early 2014, McAfee commissioned research group Vanson Bourne to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them. The findings, summarized in this executive summary, show that most respondents do not fully understand AETs and, as a consequence, are not deploying comprehensive security solutions to thwart them.

Sponsor: McAfee


 

Demand More, Get the Most from the Move to a Next-Generation Firewall

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Sponsor: McAfee


 

Augmented VPN

Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.

Sponsor: McAfee


 

Protect Against Advanced Evasion Techniques

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.

Sponsor: McAfee


 

Advanced Evasion Techniques for Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.

Sponsor: McAfee


 

Advanced Attacks Demand New Defenses

Security threat and response is a vicious circle of escalating (and increasingly cagey) attacks and sophisticated (and increasingly costly) defenses. The latest generation of malware includes deviously creative evasive techniques crafted to exploit ambiguities in the Internet's underlying technology, flaws in network software stacks, and limitations of security appliances. In this report, we discuss these techniques, how IT teams can test their level of exposure, and how to detect and block attacks using advanced packet normalization.

Sponsor: McAfee