Tuesday, January 22, 2013

McAfee outlines strategy for business security | Networks Asia

McAfee has announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better protection from new types of attacks.?

The company says it will expand its current broad portfolio through strategic acquisitions, development projects and key partnerships to deliver more integrated solutions and comprehensive protection across mobile devices, endpoints, servers, and network through an extensible framework.?

When organizations deploy many separate technologies, gaps are created which lead to breaches and compliance violations and allows attacks to happen.? Last year, attacks such as Flame and Shamoon exposed vulnerabilities in the point security product approach.? Additionally, the biggest day-to-day cost driver for organizations is operations including managing multiple security consoles, numerous policies and rules, and constant updates.? To tackle these inefficient silos, Security Connected seeks to deliver business efficiency, predictability and actionable information.?

?Security is now a boardroom level discussion,? said Michael Fey, chief technology officer at McAfee. ?The stakes are high, and businesses require a new model that gives them a comprehensive picture of their entire IT infrastructure. The industry has been built on a historical thought process that will not support the demands of the future.? We must move to having a real-time understanding and response capability if we are to meet the needs of the future.?

McAfee Security Connected brings network and endpoint together through an extensible framework, centralized management and integrated with global threat intelligence delivers unprecedented visibility across all threat vectors.?

At the core of McAfee Security Connected are the principles of integrated solutions, built-in intelligence, and advanced management offered with an extensible architecture for partners.

For integrated management, the McAfee ePolicy Orchestrator? is security management software in the industry that scales to over 250,000 nodes from a single server, and running on over 100 million endpoints.

Meanwhile the McAfee Enterprise Security Manager enables business with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring.? McAfee Enterprise Security Manager is built for big security data ? featuring a specialized security information management back-end that delivers unsurpassed speed, intelligence and scalability.?

For intelligence, McAfee Network Security will continue to be an important focus within Security Connected. McAfee offers market leading IPS, next generation firewall, DLP, Web and network email security with an optimized management platform.?

Also part of the Security Connected framework is McAfee Endpoint Security that includes virtualization security, mobile protection, endpoint email security, whitelisting technology and web safety, and protection below the OS to allow businesses to guard devices against the latest threats with fewer IT resources.

Core to the Security Connected framework is the McAfee Global Threat Intelligence (GTI) which monitors the behavior of millions of Web sites globally and associated domain assets (email servers, file servers, etc.) to identify anomalous and potentially dangerous behavior.

By establishing and tracking a reputation score for these millions of sites, McAfee GTI can identify new cyberthreats as they occur and empower McAfee endpoint, network, and gateway products to protect users from new and emerging threats. Only McAfee Global Threat Intelligence is capable of identifying and blocking threats emanating from file, web, email, and network sources.

Source: http://www.networksasia.net/content/mcafee-outlines-strategy-business-security

titanic ii babe ruth new jersey nets nba playoff schedule rondo morris claiborne mothers day gifts

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.