McAfee
MCFE
概述
总部
美国
|
成立年份
1987
|
公司类型
私营公司
|
收入
$1-10b
|
员工人数
1,001 - 10,000
|
网站
|
公司介绍
McAfee 正在创造在线保护的未来。作为技术专家、创意人员和充满期待的人们,McAfee 让在线生活变得安全,因此每个人都可以满怀信心地享受它 - 以各种不断变化的形式。正如在线生活充满了可能性一样,McAfee 的生活也是如此。您将可以自由探索挑战,承担明智的风险,并在世界上发展最快的行业之一发挥您的潜力 - 由支持和激励您的团队提供支持。
物联网解决方案
开放、互联的 McAfee 安全生态系统使 IoT 设备制造商能够更快地检测、保护和纠正威胁,并以更少的资源自动防御。在 McAfee 和第三方产品之间共享威胁情报的能力有助于 IoT 设备制造商构建具有更强安全性的产品,从而可以更快地适应不断变化的威胁形势。
主要客户
WEG 行业、HCL 技术、英格拉姆和佳能
物联网应用简介
技术栈
McAfee的技术栈描绘了McAfee在网络安全和隐私, 和 网络与连接等物联网技术方面的实践。
-
设备层
-
边缘层
-
云层
-
应用层
-
配套技术
技术能力:
无
弱
中等
强
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.
实例探究.
Case Study
Equinix Manages Shadow IT Cloud Usage and Enforces Security, Compliance and Governance Policies for Box
Equinix, a technology company, was facing challenges in identifying the cloud services being used by its employees. The process of approving new cloud services was time-consuming, requiring about 30 person-hours of due diligence by a small staff of three security experts. The team had to manually verify security practices and assess risk factors, which was taxing. Additionally, they lacked tools to manage log files focusing on cloud services risks. The company needed a tool that could discover and identify all cloud services in use, reduce the time and cost of vetting cloud services, provide anomaly detection to spot behaviors that likely indicated data leakage, and prevent access to high-risk cloud services.
Case Study
REA Group Case Study
REA Group, a multinational digital advertising company specializing in real estate, was facing challenges in discovering and monitoring cloud usage in an open cloud environment and blocking high-risk sites and services. They needed to securely roll out sanctioned collaboration tools like Box to a global workforce. The company also aimed to deliver on security roadmaps while meeting the four pillars of REA Group’s technology strategy. As a cloud-first organization with 90% of its systems being SaaS based, the IT team at REA Group developed two parallel roadmaps for their technology and security teams that suited REA Group’s open technology culture and met the four pillars of its technology strategy: discovery, reporting, risk assessment and policy control.
Case Study
Adventist Health System Case Study
Adventist Health System, a healthcare network with 45 hospital campuses, was faced with the challenge of enforcing strict HIPAA compliance requirements to protect personal health information. During a large initiative to migrate all of their users from a legacy, on-premises Microsoft Exchange system to Exchange Online, they were presented with additional Office 365 opportunities and services in addition to email. One of the value-added services made available to users was OneDrive, which gave them cause to consider their security, compliance and risk, not just for Office 365, but for all cloud services. They lacked visibility into cloud service providers and needed additional security controls for the 70,000+ users who were migrated from on-premises Exchange to cloud-based Office 365.
Case Study
Torrance Memorial Medical Center Case Study
Torrance Memorial Medical Center (Torrance Memorial) has been growing rapidly over the last five years, acquiring new business entities and expanding its physician network. This rapid growth resulted in network sprawl and a rapidly growing workforce. Both new and old employees at Torrance Memorial were using more and more cloud computing services. As a healthcare organization, Torrance Memorial is a highly regulated entity due to privacy and medical records concerns. Todd Felker, Torrance Memorial’s technical services manager, wanted to know exactly which services employees were using to ensure he could maintain high security and privacy standards. Felker also needed this information to put in place a cloud services security policy that was flexible enough to allow employees to use the tools they needed but granular enough to maintain rock-solid security and resource controls. He also had no easy way to rate the risk of the different cloud services. With an IT security staff of only one person, Felker did not have sufficient resources to perform regular diligence on the risks posed by cloud services.
Case Study
Williams Case Study
Williams, a large-scale energy infrastructure company, had been allowing its employees to use cloud services without a security stamp of approval. This led to a lack of visibility into the number of cloud services in use across the enterprise and the associated risks. The company was spending too many man hours assessing the security of cloud services when employees requested a new service. They were unable to enforce policies and ensure compliance without impacting the user experience. The company needed a solution to gain visibility into the cloud services being used, understand the risks, and enforce policies without affecting productivity.
Case Study
Maricopa County Case Study
Maricopa County, the largest county in Arizona and the fourth largest in the United States, faced several challenges in managing its vast network of users and data. The county's Chief Information Officer, David Stevens, wanted to fully understand and govern where their data was going and who had access to it, as it was essential to maintaining the agency’s security. The county faced challenges such as insufficient blocking of malware and high-risk services due to proxy categorization of services based on URL. The county's vast existing infrastructure required frictionless integration across multiple solutions and business units for core functionality. Furthermore, the county lacked visibility into cloud use and risk, data access, and traffic.
Case Study
Steelcase Case Study
Steelcase, a Fortune 1000 organization with 6,500 remote access workers across the globe, was facing challenges due to the rapid adoption of cloud services. This led to multiple accounts, passwords, and login procedures, which increased the risk of unauthorized access to sensitive company information. The growth of shadow cloud services, unmanaged by the IT department, also posed a significant risk. The company wanted to enable cloud services like Office 365 while ensuring sensitive data is protected. Two years prior, the Steelcase Board of Directors’ Audit Committee had expressed concern over the vast amount of cloud applications and services in use at the company and requested an audit, which required finding, vetting and approval of all cloud services.
Case Study
Perrigo Case Study
Perrigo, a global pharmaceutical company, was facing challenges with its existing procedures which led to inconsistent cloud security policy enforcement and created risk of data exfiltration. The backlog of cloud service approval requests from employees inhibited productivity. The lack of visibility into cloud service providers in use prohibited proactive cloud enablement. The company needed granular visibility into what their users were doing and the ability to provide policy controls for different business units. They needed to gain complete visibility into cloud usage, proactively block high-risk services, and increase detection of high-risk behavioral anomalies.
同类供应商.
Supplier
Cisco
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the Internet. Over the last 30 plus years, they have been the world’s leader in connecting people, things, and technologies - to each other and to the Internet - realizing their vision of changing the way the world works, lives, plays, and learns.Today, Cisco has over 70,000 employees in over 400 offices worldwide who design, produce, sell, and deliver integrated products, services, and solutions. Over time, they have expanded to new markets that are a natural extension of their core networking business, as the network has become the platform for automating, orchestrating, integrating, and delivering an ever-increasing array of information technology (IT)–based products and services.Subsidiaries/ Business Units: - Jasper - OpenDNS - CloudLock
Supplier
Microsoft
Microsoft develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers.Year Founded: 1975Revenue: $93.6 billion (2014)NASDAQ: MSFT
Supplier
Unisys
Unisys is a global information technology company that works with many of the world's largest companies and government organizations to solve their most pressing IT and business challenges. The company's services unit handles outsourcing, systems integration and consulting, infrastructure services, and core maintenance, while its technology division develops enterprise-class servers and related operating systems and middleware.