Article

Intel® Device Protection Technology and McAfee Mobile Security for Android*

Intel® Device Protection Technology
Authored by EGOR F. (Intel) Last updated on 02/24/2017 - 12:04
Article

McAfee* Application Control 6.1.0: Command Line Interface Guide

The McAfee* Application Control 6.1.0 Guide is a reference for the commands available for the command line interface (CLI) and includes supported arguments and their descriptions, for use in standa

Authored by SHAWN M. (Intel) Last updated on 02/03/2017 - 01:08
Article

McAfee* Application Control 6.1.0: Product Guide

The McAfee* Application Control 6.1.0 Product Guide covers workflow concepts, control modes, and dynamic whitelisting, using the CLI interpreter and deployment of Application Control to protect sys

Authored by SHAWN M. (Intel) Last updated on 02/03/2017 - 01:08
Article

McAfee* Change Control 6.1.0: Product Guide

The McAfee* Change Control Product Guide is a comprehensive reference that covers initial set-up, configuration, and ongoing maintenance of change control and includes remote administration and tro

Authored by SHAWN M. (Intel) Last updated on 02/03/2017 - 01:08
Article

McAfee* Embedded Control 6.5.0: User Guide

The McAfee* Embedded Control user guide provides information about using Embedded Control 6.5.0 with Wind River* Linux* 5.0.1 to provide system integrity and change control and block unauthorized a

Authored by SHAWN M. (Intel) Last updated on 02/03/2017 - 01:08
Video

McAfee Next Generation Firewall on Oracle VM (OOW '14)

At Oracle OpenWorld 2014, Wim Coekaerts (Oracle) and Rishi Bhargava (Intel Security) talk about the McAfee Next Generation Firewall for Oracle VM and discuss the future of security in a software de

Authored by JUAN R. (Intel) Last updated on 02/02/2017 - 11:05
Blog post

2016 Cybersecurity Predictions – Integrity Attacks

Cybersecurity changes rapidly.

Authored by Rosenquist, Matthew L (Intel) Last updated on 11/10/2016 - 13:37
Blog post

McAfee Social Protection (beta)

Have you ever shared a photo with a couple of friends and wondered what would happen if the photo went public?

Authored by hernan-alijo (Intel) Last updated on 08/15/2016 - 12:50
Article

Endpoint Security Software Vendor Program

Background

Authored by Grant Mcmullen (Intel) Last updated on 08/15/2016 - 12:39
For more complete information about compiler optimizations, see our Optimization Notice.