Abstract is: McAfee Corp. (/ˈmækəfiː/ MA-kə-fee), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California. The company was purchased by Intel in February 2011, and became part of the Intel Security division. In 2017, Intel had a strategic deal with TPG Capital and converted Intel Security into a joint venture between both companies called McAfee. Thoma Bravo took a minority stake in the new company, and Intel retained a 49% stake. The owners took McAfee public on the NASDAQ in 2020, and in 2022 an investor group led by Advent International Corporation took it private again.
public company | Q891723 |
business | Q4830453 |
enterprise | Q6881511 |
P3797 | autonomous system number | 46484 |
P5531 | Central Index Key | 0000890801 |
P10206 | Comparably company ID | mcafee |
P2088 | Crunchbase organization ID | mcafee |
P2013 | Facebook username | McAfee |
P646 | Freebase ID | /m/01c6p1 |
P7502 | Golden ID | McAfee-GRAB3 |
P4264 | LinkedIn company or organization ID | 2336 |
P1581 | official blog URL | https://www.mcafee.com/blogs/ |
P856 | official website | https://www.mcafee.com/ |
P3153 | Open Funder Registry funder ID | 100005139 |
P3417 | Quora topic ID | McAfee-company |
P12086 | WikiKids ID | McAfee |
P2002 | X username | McAfee |
P2397 | YouTube channel ID | UCpvWmi8WBh_2RedB5-xDOXg |
P3553 | Zhihu topic ID | 19654292 |
P17 | country | United States of America | Q30 |
P112 | founded by | John McAfee | Q45864 |
P159 | headquarters location | San Jose | Q16553 |
Santa Clara | Q159260 | ||
P571 | inception | 1987-01-01 | |
P452 | industry | antivirus software | Q93249 |
software industry | Q880371 | ||
computer security | Q3510521 | ||
computer security industry | Q97466080 | ||
P1454 | legal form | limited liability company | Q149789 |
P463 | member of | European Committee for Interoperable Systems | Q2985457 |
CVE Numbering Authority | Q67904121 | ||
P138 | named after | John McAfee | Q45864 |
P1448 | official name | Intel Security Group | |
McAfee Associates, Inc. | |||
McAfee, LLC | |||
P127 | owned by | Intel | Q248 |
TPG | Q2164606 | ||
P749 | parent organization | Intel | Q248 |
P1056 | product or material produced or service provided | software | Q7397 |
antivirus software | Q93249 | ||
McAfee Anti Virus | Q15834632 | ||
P8687 | social media followers | 19500 | |
118462 | |||
P414 | stock exchange | Nasdaq | Q82059 |
P910 | topic's main category | Category:McAfee | Q9524842 |
FileName: New McAfee Headquarters.jpg
Description: McAfee headquarters in Santa Clara.
Artist: Adc1999 at English Wikipedia.
Work is copyrighted.
License: CC BY-SA 3.0
Attribution is required.
Q123014272 | Agent assisted malicious application blocking in a network environment |
Q122877910 | Agentless security |
Q122853269 | Authenticated discoverability of Universal Windows Applications to Win32 desktop applications |
Q122781603 | Automated asset criticality assessment |
Q122848923 | Automatic placeholder finder-filler |
Q122842077 | Beacon cloud reputation service |
Q122789586 | Behavioral user security policy |
Q122803220 | Cache system for consistent retrieval of related objects |
Q123009156 | Cached file reputations |
Q122845431 | Client-only virtual private network |
Q122782517 | Cloud-based shared security cache |
Q122855914 | Cloud-based tamper detection |
Q122806709 | Context-aware reputation of a place |
Q123007330 | Cryptojacking detection |
Q122987081 | Data leakage mitigation with a blockchain |
Q122879836 | Decision forest compilation |
Q122845294 | Detecting execution of modified executable code |
Q122818536 | Detecting ransomware |
Q126941857 | Detection and mitigation of fileless security threats |
Q122818968 | Detection of malicious polyglot files |
Q122765596 | Device, system and method for defending a computer network |
Q122850177 | Digital protection that travels with data |
Q122978590 | Distributed authentication with thresholds in IoT devices |
Q123015969 | Distributed communication between internet of things devices |
Q122803228 | Distributed data query |
Q122819040 | Dynamic extension of restricted software applications after an operating system mode switch |
Q122850184 | Dynamic re-distribution of detection content and algorithms for exploit detection |
Q122780523 | Dynamically identifying criticality of services and data sources |
Q122848572 | Enhanced secure boot |
Q122819560 | Expedition of web phishing detection for suspicious sites |
Q122789393 | Extensible search solution for asset information |
Q122850168 | Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection |
Q122938609 | Hardware-based device authentication |
Q122855850 | Identification of malicious execution of a process |
Q123007850 | Identification of malware |
Q122939031 | Intelligent backup and versioning |
Q122789722 | Interstitial 3D scene information in video streams |
Q122805509 | Malicious advertisement protection |
Q122830551 | Malware detection using a digital certificate |
Q123015887 | Mechanism to determine cellular signal reputation of a location and intelligently manage lack of connectivity |
Q122765684 | Method and apparatus for detecting malware via analysis of a screen capture |
Q123027056 | Method and apparatus for hardware based file/document expiry timer enforcement |
Q122997899 | Method and apparatus to detect security vulnerabilities in a web application |
Q122917688 | Method and system for centralized contact management |
Q122789788 | Methods and apparatus for malware detection using jar file decompilation |
Q122803111 | Methods and apparatus to deconflict malware or content remediation |
Q124452772 | Methods and apparatus to deconflict malware or content remediation |
Q122941447 | Methods and apparatus to defend against DLL side-loading attacks |
Q122987699 | Methods and apparatus to detect adversarial malware |
Q124464800 | Methods and apparatus to detect and prevent host firewall bypass threats through a data link layer |
Q122794576 | Methods and apparatus to implement a virtual private network with probe for network connectivity |
Q122889396 | Methods and apparatus to partition a database |
Q122884552 | Methods and apparatus to perform malware detection using a generative adversarial network |
Q123024805 | Methods and apparatus to protect open and closed operating systems |
Q122938613 | Methods and apparatus to verify encrypted handshakes |
Q123026106 | Methods, apparatus, and systems to aggregate partitioned computer database data |
Q122802750 | Methods, systems, and media for dynamically separating internet of things devices in a network |
Q122789508 | Methods, systems, and media for indicating a security status of an internet of things device |
Q122830788 | Methods, systems, and media for protected near-field communications |
Q122987696 | Methods, systems, and media for protecting applications from malicious communications |
Q122940987 | Methods, systems, and media for protecting computer networks using adaptive security workloads |
Q122874494 | Methods, systems, and media for protecting computer systems from user-created objects |
Q123015985 | Methods, systems, articles of manufacture and apparatus to identify applications |
Q122790238 | Methods, systems, articles of manufacture and apparatus to reduce spoofing vulnerabilities |
Q122789386 | Mitigation of deceptive advertisements |
Q123021475 | Mobile application management |
Q123020857 | Mobile risk assessment |
Q122938607 | Model-based system, method, and computer program product for detecting at least potentially unwanted activity associated with confidential data |
Q122819036 | Monitoring and analyzing watchdog messages in an internet of things network environment |
Q122764831 | Multi-dimensional malware analysis |
Q122940213 | Multi-lateral process trees for malware remediation |
Q122802191 | Multilayer access control for connected devices |
Q122890306 | On-device dynamic safe browsing |
Q120442212 | OpenDXL |
Q122781401 | Personalization of delivery of notifications |
Q122789509 | Privacy and security enabled domain name system with optional zero-touch provisioning |
Q123027066 | Process efficient preprocessing for any encryption standard |
Q122780520 | Protecting user identity and personal information by sharing a secret between personal IoT devices |
Q123014298 | Protection of sensitive chat data |
Q122848218 | Providing a fast path between two entities |
Q122889470 | Query optimized distributed ledger system |
Q122847731 | Runtime detection of browser exploits via injected scripts |
Q122903956 | Secure disk access control |
Q122781722 | Securing an application framework from shared library sideload vulnerabilities |
Q122789719 | Security risk evaluation across user devices |
Q123022720 | Survivable networks that use opportunistic devices to offload services |
Q122917730 | System and method for application exploration |
Q123007761 | System and method for collective and collaborative navigation by a group of individuals |
Q122876012 | System and method for protecting specified data combinations |
Q123021472 | System and method for statistical analysis of comparative entropy |
Q122765590 | System for authenticating a phone number using a phone number certificate |
Q122819609 | System, apparatus and method for migrating a device having a platform group |
Q122852606 | Systems, methods, and media for controlling traffic to internet of things devices |
Q122780522 | Systems, methods, and media for intelligent split-tunneling |
Q123025617 | Techniques for identification of location of relevant fields in a credential-seeking web page |
Q122803132 | Unencrypted client-only virtual private network |
Q122802749 | User activity-triggered URL scan |
Q122938602 | Using a blockchain for distributed denial of service attack mitigation |
Q122802746 | Visual detection of phishing websites via headless browser |
Q122782605 | Visual identification of malware |
Q7848182 | Trusted Information Systems | followed by | P156 |
Q120462029 | McAfee Royalty Free Software License | author | P50 |
Q248 | Intel | owner of | P1830 |
Q9524842 | Category:McAfee | category's main topic | P301 |
Q248 | Intel | has subsidiary | P355 |
Q73347914 | Network Associates, Incorporated | part of | P361 |
Q5627814 | H*Commerce: The Business of Hacking You | distributed by | P750 |
Q109378418 | Pretty Good Privacy Inc. | merged into | P7888 |
Категория:McAfee | wikinews | |
Arabic (ar / Q13955) | مكافي | wikipedia |
azb | مکآفی | wikipedia |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
en-simple | McAfee | wikipedia |
Esperanto (eo / Q143) | McAfee | wikipedia |
McAfee | wikipedia | |
Persian (fa / Q9168) | مکآفی | wikipedia |
McAfee | wikipedia | |
McAfee | wikipedia | |
מקאפי | wikipedia | |
hi | मैक्एफ़ी | wikipedia |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
マカフィー | wikipedia | |
맥아피 | wikipedia | |
ml | മക്കഫീ | wikipedia |
mr | मॅकअॅफी | wikipedia |
McAfee | wikipedia | |
nb | McAfee | wikipedia |
McAfee | wikipedia | |
Norwegian, Nynorsk (nn / Q25164) | McAfee | wikipedia |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
sah | McAfee | wikipedia |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
McAfee | wikipedia | |
uz | McAfee | wikipedia |
McAfee | wikipedia | |
迈克菲 | wikipedia |
Search more.