Close
Skip to content

McAfee

McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe.

 
 

In the News

 

McAfee: Anthem

Protecting your identity is about more than protecting your financial information—it’s about protecting who you are. With so much information about your life stored on your personal device, a cyber attack can be one of the most devastating events that can occur in this day and age. Cyber crime is on the rise; are you prepared? The more connected we are, the more we open ourselves up to these attacks. Do you have the necessary precautions in place, not only to protect your financial information, but all of the vital, precious, and personal data stored on your device?

Videos

McAfee: App Control Demo

Protecting your identity is about more than protecting your financial information—it’s about protecting who you are. With so much information about your life stored on your personal device, a cyber attack can be one of the most devastating events that can occur in this day and age. Cyber crime is on the rise; are you prepared? The more connected we are, the more we open ourselves up to these attacks. Do you have the necessary precautions in place, not only to protect your financial information, but all of the vital, precious, and personal data stored on your device?

McAfee: What happened to my email?

McAfee Email Protection is the newest innovation in email security, allowing network administrators complete control over and access to what kinds of emails individual users can receive. It even allows administrators to see what has happened to a specific email, which might have gotten tied up in the program’s security screens. If a user was expecting an email and calls to ask what might have happened to it, the administrator can simply type in the user’s email or a wildcard keyword and see exactly where that email is in the system.