Welcome!

@CloudExpo Authors: Suresh Sambandam, Teridion Blog, William Schmarzo, Liz McMillan, Ed Featherston

News Feed Item

McAfee Sets a New Standard for Comprehensive Malware Protection

RSA CONFERENCE – McAfee today announced that it has acquired from LynuxWorks, Incorporated, the ValidEdge sandboxing technology that identifies sophisticated, hard-to-detect malware, to broaden its anti-malware portfolio and further strengthen the McAfee Security Connected approach. McAfee also announced more than 30 malware-focused product enhancements that will extend the company’s lead in comprehensive malware protection.

The acquired technology provides advanced threat detection by running suspected malware in a “sandbox” and learning what impact a suspected malware sample will have on an endpoint. This new technology further strengthens McAfee’s current anti-malware offerings that have been proven as best in class at identifying day zero attacks.

Unlike other sandboxing solutions, this new technology, when integrated with McAfee’s other network and endpoint anti-malware products, will automatically block future attacks by convicted malware samples. It will also provide signature information so that already infected endpoints can be remediated automatically by McAfee ePolicy Orchestrator (McAfee ePO). McAfee plans to deliver the first product that integrates the new sandboxing technology in the second half of 2013.

A single point product cannot deliver comprehensive malware protection. The only way to effectively combat the onslaught of malware threats now numbering close to 100,000 per day1 is through an integrated, end-to-end, holistically-managed approach to security. To support that comprehensive approach, McAfee has made over 30 significant anti malware product enhancements including the following:

  • McAfee Network Security Platform - Adds new “signature-less” threat detection and prevention technologies, strong botnet prevention, deep file analysis, and a powerful anti-malware engine capable of detecting advanced malware across a full range of protocols and file types. It also adds intelligent alert prioritization to automatically prioritize network events and improve integration with McAfee ePO and McAfee Enterprise Security Manager, making use of real-time information so operators have the full context of an attack, at the precise time of the attack.
  • McAfee Web Protection –– Now expands emulation capabilities to identify advanced malware that dynamically changes in the browser in an attempt to avoid detection. It also adds a new outbound detection technique that reveals bot infections attempting to receive additional malicious code. Expanded reporting capabilities include actionable reporting to help reduce attack vulnerability by simplifying the blacklisting process across McAfee ePO-connected products.
  • McAfee Email Protection - Can be deployed on-premise, in the cloud, and now as an integrated combination of both with a single pane of glass architecture, reducing cost and increasing efficiency while blocking malware away from the network. Also adds graymail filtering to improve employee productivity.
  • McAfee Enterprise Security Manager – Active integration with ePolicy Orchestrator, Network Security Platform and McAfee Vulnerability Manager automates quarantine, scan, and policy command execution – turning actionable intelligence into intelligent action.
  • McAfee Real Time for ePO – Announced earlier this month, this new product enables security decisions based on “what is” versus “what was” by querying and identifying every compromised endpoint in an organization in seconds in order to remediate those endpoints. It dramatically increases situational awareness and reduces exposure, risk, and cost of security.
  • McAfee Deep Defender – Provides protection against master boot record (MBR) rootkits. Any driver attempting to write or read a MBR is now monitored through Deep Defender, which operates beyond the OS and is enabled by hardware-enhanced security with Intel. It prevents MBR rootkits from modifying the MBR in real-time.

“According to our research, 59% of enterprise security professionals believe that they have been targeted by an advanced persistent threat,” said Tony Prigmore, senior analyst, Enterprise Strategy Group. “An integrated approach that includes network, endpoint, threat intelligence, and other security aspects is needed to help thwart advanced threats.”

McAfee’s comprehensive malware protection is based on the McAfee Security Connected platform, which helps customers improve security posture, optimize security for greater cost effectiveness, and align security strategically with business initiatives. McAfee is taking an orchestrated approach to protect against malware by intelligently applying the best technologies at the right time and in the right place to thoroughly analyze and respond to suspicious files, web sites, email messages, and networks. Best-of-breed approaches and competitive solutions either create security loopholes or cause unnecessary business delays.

“McAfee has been investing in technology to help our customers protect against malware for 20 years,” said Pat Calhoun, senior vice president and general manager of network security at McAfee. “We are now extending our lead in malware protection by continuing to invest in new products and product enhancements. Point products can’t provide adequate protection against these advanced attacks, which is why McAfee is delivering an integrated, multi layered, managed solution that provides comprehensive malware protection across endpoints and networks.”

For more information visit www.mcafee.com/cmp.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

The information contained in this document is for informational purposes only and should not be deemed an offer by McAfee or create an obligation on McAfee. McAfee reserves the right to discontinue products at any time, add or subtract features or functionality, or modify its products, at its sole discretion, without notice and without incurring further obligations.

1 McAfee Labs, Q4 2012 Threat Report

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.