Security Connected

Channel profile:

Security Connected for Enterprises

Security Connected provides McAfee customers the ability achieve optimized security each day, enabling their business while reducing risk, driving compliance and realizing operational efficiencies

Subscribers (6,527)
Plug-and-Play Deployment: “Save Travel Time and Expense Securing Remote Offices” Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
Read more >
Apr 16 2014
27 mins
Play

Webinars and videos

  • Live and recorded (97)
  • Upcoming (7)
  • Date
  • Rating
  • Views
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Every application, email, web page and Internet connection relies on information encapsulated into a data packet that can be easily distributed across networks. These packets include information about the sender and receiver, as well as the actual contents, or payload. By manipulating pieces of the packet data, criminals can infiltrate networks, applications, data centers, and individual computers.
    How do you defend your network against advanced threats that manipulate data at the packet level? Join Steve Smith, Senior Technical Marketing Manager at McAfee for a revealing presentation on the current state of threat prevention. Find out why you should be using deep packet inspection (DPI) for protocol identification, normalization, and data stream-based inspection to detect and block threats, in both clear-text and encrypted connections. And stop Advanced Persistent Threats (ATP) that rely on packet manipulation to thwart most common firewall and IPS defenses.
  • Everyone knows computer downtime is unacceptable. The world runs on data and it needs it fast. But securing that growing data network is time-consuming, expensive and often inefficient. Security professionals are looking for answers that can provide high availability and scale as the business changes. And they want solutions that are both highly secure and not a drain on computing and bandwidth resources.

    Join Steve Smith, Senior Technical Marketing Manager at McAfee for an in-depth discussion of how the next generation of firewall technology delivers scale and zero downtime performance. And learn how active-active clustering, dynamic server load balancing, management application redundancy and unique, augmented VPN capability is bringing resiliency to mission critical data networks.
  • Over the past decade, the web has become an increasingly dangerous place, as attackers launch ever more sophisticated attacks. Enterprises of all sizes, from small to global, need to protect their internal systems against both inbound and outbound attack vectors.

    External attacks can take many forms. A user’s email address may be exposed to hackers who send a phishing message with links to a web site that downloads malicious software onto the user’s PC without them being aware of it. Or, an advanced malware attack may use sophisticated obfuscation techniques to hide its true identity, enabling it to slip past a signature-based malware detection tool.

    Data leakage can come from internal users who, inadvertently or deliberately, transfer sensitive or confidential information outside the network perimeter, or a botnet client transmitting a password file to a master server located overseas.

    To counter these threats, security professionals need to deploy interlocking, coordinated security systems designed to work together. In this session, McAfee will discuss how its security platforms work together to comprehensively address the multiple security threats that customer’s encounter.

    •Overview: current malware trends and frequently encountered attack types
    •Interlocking lines of defense:
    oFirewall, Intrusion Prevention Service
    oWeb Gateway
    oEmail Gateway
    oAdvanced Threat Defense
    oData Loss Prevention
    oePO
    oMcafee Content Security Suite
  • No connection to the Internet is 100 percent reliable. But most enterprises demand always-on connectivity. Stop investing in overpriced MPLS and other complicated solutions. By integrating multiple connections of commonly used, less expensive Internet connections, you can ensure inbound, outbound and VPN traffic is uninterrupted.
    Steve Smith, Senior Technical Marketing Manager at McAfee, explains how an augmented VPN solution can deliver a simple and cost-effective way to create fast, secure, high-capacity connections between sites and ensure uninterrupted Internet connectivity. And find out more about how this McAfee NGFW capability is designed for ease of use, while the implementation requires no special equipment, software, or Internet service provider peering agreements.
  • Leading enterprises understand the value of mobility, but are struggling to create secure mobile environments while delivering on the promise of higher productivity that mobile can provide. Add BYOD, contracted workers, and scalability requirements to the mix and your mobility strategy can become highly complex.

    Join this webinar to learn how one integrated mobile solution delivers on the promise and power of mobile app management and security.

    By attending you will learn:

    •The importance of app and data level mobile security
    •Use cases for how mobile application management is currently being used by best-in-class mobile enterprises to improve security
    •Tips on how to secure, distribute, monitor, and update mobile applications and content with a mobile governance approach
    •How the Apperian and McAfee partnership will provide you with integrated management across all endpoints
  • What’s slipping past your current network security solution?

    Even the most up-to-date network security solutions are vulnerable to new game-changing threats that every enterprise needs to be aware of—advanced evasion techniques (AET). Difficult-to-detect AETs can bypass traditional security devices, attacking your network at will. The good news is that there is something you can do about them—with a strong strategy and the help of McAfee® Next Generation Firewall.
  • To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.

    McAfee DLP leverages TITUS Classification metadata to set active DLP policy and improve policy inforcement. Join TITUS and McAfee for a discussion about:

    •Why it is crucial to include users as the first line of defense
    •How DLP, NDLP, and ESM leverage TITUS
    •And the role of TITUS Classification in the DLP architecture

Embed in website or blog