McAfee, Inc. - State and Local
McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. McAfee's state and local government security portfolio delivers industry-leading technology and 24/7 Global Threat Intelligence to safeguard your systems and data against all known and emerging threats. Our solutions help you govern your network and data, protect sensitive and regulated information, meet regulatory requirements, identify and mitigate policy violations, and proactively and continuously secure your network against known and emerging threat vectors. And you can manage your entire security system from a centralized, web-based platform that boosts efficiency, cuts costs, and speeds proof of compliance.
Real Time for McAfee ePO collects McAfee endpoint security product status instantly. This real-time visibility enables you to act on the most recent intelligence and enhance situational awareness.
Control, compliance, and convenience. The tension between these factors has made it difficult for IT to consent to enterprise user demands to use their preferred mobile devices. Now, IT can wield control over mobile devices to match its ability to manage laptops and other endpoints, using the same management and reporting tools.
New York City Department of Information Technology and Telecommunications (DoITT) oversees the use of technology in city government operations. DoITT supports approximately 150,000 city employees spread across more than 100 agencies, offices, boards, and commissions. The agency is responsible for the management and improvement of IT infrastructure and service delivery within New York City government— from networks to mobile apps and data centers to datasets—for the city’s eight million residents.
Take the stealth, creativity, and patience of Stuxnet. Add the commercialism, wide distribution, and easy-to-use tool kits of Zeus. Consider that despite more than years of activity, as of May 2011, neither of these cyber criminal teams has been exposed. You now understand the recipe—and potency—of today’s malware. Start planning now. It will take more than signatures and operating system-level protections to protect your intellectual property and other assets against criminals wielding these weapons.
Databases are repositories of the most valuable information assets in the enterprise. And yet, in many organizations today, they are poorly protected. Databases can and must be secured as well as or better than any systems in the enterprise.
This Digital Communities white paper highlights discussions with IT officials in four counties that have adopted shared services models. Our aim was to learn about the obstacles these governments have faced when it comes to shared services and what it takes to overcome those roadblocks. We also spoke with several members of the IT industry who have thought long and hard about these issues. The paper offers some best practices for shared government-to-government services, but also points out challenges that government and industry still must overcome before this model gains widespread adoption.