McAfee Offers One-Stop Business Security: In 15 Minutes!McAfee Offers One-Stop Business Security: In 15 Minutes!
McAfee's new Total Protection for Secure Business aims to address the top small and midsized business security concerns and give you the tools to deal with them in 15 minutes a day.
October 13, 2008
McAfee's new Total Protection for Secure Business aims to address the top small and midsized business security concerns and give you the tools to deal with them in 15 minutes a day.The McAfee product initiative, its ToPS (Total Protection for Secure Business) suite, addresses desktop and server security, data protection and data theft prevention, Web and e-mail security, compliance regulation, auditing and logs, all from the perspective of the small and midsized business whose IT/security resources may be limited at best.
One of the keys to the program that McAfee is touting is its Security In 15 Minutes approach.
According to McAfee, 15 minutes a day -- an hour or so a week -- is about all most small and midsized businesses have available for addressing security concerns, needs and applications.
By automating the most common security procedures, and providing users with straightforward guides to which procedures need to be run daily, weekly, monthly and so on, the company hopes to reach small and midsized businesses in the realities in which they live: their pitch isn't just the quality of their products, it's also their understanding of the resources you have to apply to security products and services (whether McAfee's or not.)
ToPS just launched today: it's far too soon to tell if the approach will work. But McAfee's recognition not only of the threat environment in which your business must function but also the limitations of time, money and personnel you're able to devote to the environment makes it worth a look:
About the Author(s)
You May Also Like
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware