Tag: Endpoint security

When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you want every endpoint to be upgraded to a specific software version, for example. In many cases, you’re forced to rely on manual tracking, where errors and omissions are commonplace. And, if you want to demonstrate ...
Read Blog
Few engineers will tell you that software updates are their favorite part of the job, but they’re a critically important part of endpoint security. Unfortunately, they do sometimes come with hassles—in particular, dealing with traffic surges over the WAN whenever many endpoints need to download large software packages at the same time. In my last ...
Read Blog
At some point as a child, a parent likely told you, “actions speak louder than words.” It’s a good life lesson—and it can hold just as true when fighting malware. Cybercriminals have become extremely skilled at disguising the true nature of malware attacks. The best way to protect your users is to employ a layered ...
Read Blog
One thing that sets McAfee apart in endpoint security is the ability to manage multiple security technologies for hundreds of thousands of endpoints through a single interface: McAfee ePolicy Orchestrator (ePO). But while our customers appreciate ePO, it’s even more powerful than some realize. In my next few blogs, I’ll discuss some ePO features that ...
Read Blog
Estamos acompanhando a transformação digital e assistindo cada vez mais coisas serem conectadas. Essa evolução cria ambientes bastante heterogêneos, formados por diversas tecnologias, com diversas funções desenvolvidas por diversos fabricantes. O ambiente de segurança também é bastante diversificado. Atualmente são necessários muitos consoles para gerenciar diversas funcionalidades. Esse cenário acaba criando brechas, pois quando as ...
Read Blog
Estamos acompañando la transformación digital y viendo cada vez más cosas siendo conectadas. Esa evolución crea ambientes bastante heterogéneos, formados por diversas tecnologías, con diversas funciones desarrolladas por diversos fabricantes. El ambiente de seguridad también es bastante diversificado. Actualmente son necesarias muchas consolas para gestionar diversas funcionalidades. Ese escenario acaba creando brechas, pues cuando las ...
Read Blog