{"id":250,"date":"2013-08-04T09:24:44","date_gmt":"2013-08-04T09:24:44","guid":{"rendered":"https:\/\/chorus.bg\/?page_id=250"},"modified":"2013-08-04T09:24:44","modified_gmt":"2013-08-04T09:24:44","slug":"intel-security","status":"publish","type":"page","link":"https:\/\/chorus.bg\/en\/security\/intel-security\/","title":{"rendered":"Services"},"content":{"rendered":"<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/Intel.bmp\"><img loading=\"lazy\" class=\"alignnone wp-image-754 size-full\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/Intel.bmp\" alt=\"Intel\" width=\"471\" height=\"446\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<h3 class=\"title-block\"> Security Solutions <\/h3>\n<p>With its Secure Connected strategy and innovative approach to hardware-integrated protection and a unique cloud reputation system Global Threat Intelligence.\u00a0Intel Security are an established leader in developing proven, proactive security solutions and services that protects the system, networks and mobile devices.<\/p>\n<p>Intel Security is the biggest manufacturer of security solutions with the broadest portfolio that includes products for:<\/p>\n<p>&#8211; Antivirus Protection for workstations, servers and mobile devices<\/p>\n<p>&#8211; Data and network protection<\/p>\n<p>&#8211; Web and Email Protection<\/p>\n<p>&#8211; Solutions that meet the compliance requirements and optimizing the security<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"content-container nopadding m-bot-20 clearfix\">\n<div class=\"eight columns alpha\">\n<div class=\"block5-container content-container-white\">\r\n\t\t\t\t<a class=\"block5-a clearfix\" href=\"#\">\r\n\t\t\t\t<div class=\"box5-img-container\"><img src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/ICON_NANOWISSENSCHAFTEN_White.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<div class=\"box5-text-container\"><h3 class=\"long-text\">Data Loss Prevention<\/h3><h5><\/h5><\/div>\r\n\t\t\t\t<\/a><\/div>\n<\/div>\n<div class=\"eight columns omega\">\n<div class=\"block5-container content-container-white\">\r\n\t\t\t\t<a class=\"block5-a clearfix\" href=\"#\">\r\n\t\t\t\t<div class=\"box5-img-container\"><img src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/haivisio_icon.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<div class=\"box5-text-container\"><h3 class=\"long-text\">New Generation Fire Wall<\/h3><h5><\/h5><\/div>\r\n\t\t\t\t<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"content-container nopadding no clearfix\">\n<div class=\"eight columns alpha\">\n<div class=\"block5-container content-container-white\">\r\n\t\t\t\t<a class=\"block5-a clearfix\" href=\"#\">\r\n\t\t\t\t<div class=\"box5-img-container\"><img src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/haivisio_icon.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<div class=\"box5-text-container\"><h3 class=\"long-text\">Security Information and Event Management<\/h3><h5><\/h5><\/div>\r\n\t\t\t\t<\/a><\/div>\n<\/div>\n<div class=\"eight columns omega\">\n<div class=\"block5-container content-container-white\">\r\n\t\t\t\t<a class=\"block5-a clearfix\" href=\"#\">\r\n\t\t\t\t<div class=\"box5-img-container\"><img src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/ICON_NANOWISSENSCHAFTEN_White.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<div class=\"box5-text-container\"><h3 class=\"long-text\">Endpoint Protection <\/h3><h5><\/h5><\/div>\r\n\t\t\t\t<\/a><\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"caption-container m-bot-20\"><div class=\"caption-text-container\"><strong>MCAFEE ENDPOINT PROTECTION<\/strong><\/div><div class=\"content-container-white caption-bg clearfix\"><\/div><\/div>\n<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/1.png\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-1416\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/1-223x300.png\" alt=\"1\" width=\"223\" height=\"300\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<p>Truth is, that every business can afford security solutions that are productive and efficient, and are easy to use. McAfee Complete Endpoint Protection Suites provides protection on several levels from a full range of threats, from zero-day to hacker attacks, protecting the systems working with Windows, Mac and Linux as well as iPhone, iPad and smartphones and tablets with Android. Your endpoint security uses a single managing platform. It also uses SaaS based solutions (Security-as-a-Service &#8211; Security offered as a service).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"caption-container m-bot-20\"><div class=\"caption-text-container\">MCAFEE NETWORK DEFENSE<\/div><div class=\"content-container-white caption-bg clearfix\"><\/div><\/div>\n<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/2.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-1417\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/2-300x225.jpg\" alt=\"2\" width=\"300\" height=\"225\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<p>McAfee Network Security solutions include a new generation firewall (next-generation firewall) and protects against unauthorized access to hosts, advanced analysis technologies, as well as a system for detecting threats, all of them designed with the idea to protect networks from new generation. McAfee\u2019s Security Connected strategy for network protection, providing maximum accessibility, security, integration, flexibility and easy management with minimal risks and advance planning. With proven reputation in protecting the network, McAfee is the most common choice of partner for companies and governments worldwide.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"caption-container m-bot-20\"><div class=\"caption-text-container\">MCAFEE WEB &amp; EMAIL SECURITY<\/div><div class=\"content-container-white caption-bg clearfix\"><\/div><\/div>\n<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/3.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-1418\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/3-300x284.jpg\" alt=\"3\" width=\"300\" height=\"284\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<p>Security solutions from McAfee for e-mail and Web provide protection against threats, preventing data loss and advanced protection from malicious code. McAfee\u2019s Security Connected strategy provides comfort for data transferring to and from the cloud network system, reducing complexity and costs of security management.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"caption-container m-bot-20\"><div class=\"caption-text-container\">MCAFEE DATA PROTECTION<\/div><div class=\"content-container-white caption-bg clearfix\"><\/div><\/div>\n<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/4.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-1419\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/4-300x176.jpg\" alt=\"4\" width=\"300\" height=\"176\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<p>Data loss prevention with McAfee\u2019s Data protection. Either as individual products or as an integrated solution, McAfee Complete Data Protection Suites and McAfee Data Loss Prevention provide multi-layered protection for data, no matter if it is in the network or in the cloud. Protects you against data loss, removes threats before they cause damage and efficiently manage your data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"caption-container m-bot-20\"><div class=\"caption-text-container\">MCAFEE RISK &amp; COMPLIANCE<\/div><div class=\"content-container-white caption-bg clearfix\"><\/div><\/div>\n<div class=\"content-container-white pad-l-r-5 m-bot-35 clearfix\">\n<div class=\"row\">\n<div class=\"in-eight in-columns alpha\">\n<p><a href=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/5.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-1420\" src=\"http:\/\/chorus.bg\/wp-content\/uploads\/2013\/08\/5-300x268.jpg\" alt=\"5\" width=\"300\" height=\"268\" \/><\/a><\/p>\n<\/div>\n<div class=\"in-eight in-columns omega\">\n<p>McAfee\u2019s products from the Risk &amp; Compliance group serve to control and reduce corporate risks, to meet the compliance requirements and to optimize the security. Using a single management console that gives information about the activity of network processes and endpoints, easily identify security gaps and identify vulnerabilities so that they can protect the most critical assets by sharing the security budget where there the greatest need. With McAfee products to manage corporate risks can be reduced budget expenditure for defense, while at the same time achieve higher levels of security and provide greater control.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<a href=\"http:\/\/www.mcafee.com\/us\/index.html\" class=\"button gray large\"><i class=\"icon-unlock\"><\/i>McAfee<\/a>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":859,"menu_order":0,"comment_status":"open","ping_status":"open","template":"templates\/page-fullwidth.php","meta":{"_mo_disable_npp":""},"translation":{"provider":"WPGlobus","version":"3.0.1","language":"en","enabled_languages":["bg","en"],"languages":{"bg":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/pages\/250"}],"collection":[{"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":2,"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/pages\/250\/revisions"}],"predecessor-version":[{"id":4084,"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/pages\/250\/revisions\/4084"}],"up":[{"embeddable":true,"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/pages\/859"}],"wp:attachment":[{"href":"https:\/\/chorus.bg\/en\/wp-json\/wp\/v2\/media?parent=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}