Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > McAfee > A New Approach to IT Security: Prevent Stealthy Threats and Improve Security Management
 

A New Approach to IT Security: Prevent Stealthy Threats and Improve Security Management

White Paper Published By: McAfee
McAfee
Published:  Feb 06, 2013
Type:  White Paper
Length:  19 pages

The purpose of this guide is to show you how to address the challenges of today’s threat landscape by using integrated security solutions from Intel and McAfee. Find out how McAfee* Deep Defender* hardware-assisted security and McAfee ePolicy Orchestrator* (McAfee ePO*) Deep Command* security management work together with Intel® Core™ vPro™ processors2 to help you prevent stealthy threats and improve security management for client endpoints.



Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security