Network Security and Availability Solutions

McAfee News

Subscribe to McAfee News: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get McAfee News: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information. Also read Enterprise Mobility Asia News Weekly Also read Field Mobility News Weekly Also read M2M News Weekly Also read Mobile Commerce News Weekly Also read Mobile Health News Weekly Also read Mobility News Weekly Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here! Android users can now download free McAfee anti-virus to protect their phones from online threats. McAfee, which is now part of Intel Corporation, announced at MWC 2014 that the software is available for download on Google Pl... (more)

Caught! The Real Culprit of Shadow IT

Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I hate to assume, but the odds are, that you yourself have used a non-IT approved SaaS option for the same reason as everyone else, myself included. We’re all expected to do our jobs faster, and at a higher quality than we did in the past, and sometimes it’s just too easy to go behind the backs of those whom we perceive to slow us down, or act as a blocker. A recent study showed that eighty percent of those polled admitted using SaaS applications and tools without IT’s approval, which, when you’re part of that eighty percent, isn’t all that shocking. The real kicker is the revelation of who has been using shadow IT SaaS solutions more than anyone. IT employees themselves. What’s their reasoning? “IT users feel they c... (more)

Will Google Destroy Symantec & McAfee?

Gee, and Symantec and McAfee felt squeezed when Microsoft wandered into their space. Now Google has a toehold too. Talk about being between a rock and a hard place. On May 11 Google quietly bought an outfit, a Mountain View neighbor actually, called GreenBorder Technologies Inc, and never said a word about it. The acquisition is provocative because GreenBorder is in the Internet security business, a space new to the omnivorous Google, and nobody knows how Google is going to use this widgetry; and not knowing, when you think about it, is scarier for McAfee and Symantec than knowing. Given the dismal state of security - and the increasing hostility of the Internet, even if GreenBorder is only half the end-all it's cracked up to be - and depending on how it's packaged - Google could have trouble stopping people from throwing money at it. What price your security? Anyw... (more)

Intel’s Intelligent Buy

It took me a while to digest Intel’s acquisition of McAfee. Other than giving Intel an opportunity to improve the desktop architecture by integrating security into chips and expanding their software footprint, this acquisition can also make a huge impact on the cloud computing architecture. Security is one of the biggest roadblocks that customers have to address when evaluating the possibility of using cloud computing technology in their solutions. Current technology to address security concerns increase hardware, software and services costs reducing benefits gained. Project times are also increased due to the legal issues that need to be addressed before solution implementation. These security costs could be compared to using an armored car service like Brinks to transfer cash from location to location. The weight of the armored car is so high that the gas mileage ... (more)

McAfee’s Content & Cloud CTO to Present at Cloud Expo Silicon Valley

Cloud Expo Silicon Valley $800 Savings here! How can organizations leverage the cloud to save costs and increase security today? What do they need to be thinking about and doing to plan for the future? In his session at the 7th International Cloud Expo, Scott Chasin, CTO McAfee Content & Cloud, will discuss how the cloud is changing the security game - for both good and evil. Explore Cloud Expo Sponsorship & Exhibit Opportunities ! Speaker Bio: Scott Chasin is CTO McAfee Content & Cloud. He is widely recognized as a pioneer and leading visionary in the cloud security industry, having pioneered the development and marketing of several SaaS-based messaging, collaboration and security-focused technologies. He is credited with the launch of the first Web-based email consumer service, and delivered the first IP-based commercially hosted messaging service supporting thou... (more)

ChannelVission Joins the McAfee SecurityAlliance

ChannelVission's partnership with McAfee provides an integrated cloud platform that offers exceptional security layers to channel customers at lower operational costs but can also help meet demanding compliance mandates", said Aman Sehgal, President and CEO of ChannelVission. "McAfee's security solutions will assist ChannelVission  to address the evolving threats and empower businesses globally to monetize the cloud opportunity". "This best of breed SaaS solution enables businesses to collaborate with greater confidence" said Dilip Tinnelvelly, GM of Cloud Computing Business Unit (CCBU) at ChannelVission". "This Cloud-based security partnership offers an innovative approach by adding a globally-distributed security layer to manage exponential traffic growth, virtualize infrastructure resources and secure services on a massive scale." As organizations continue to ado... (more)

Aspera Powers Big Data Ecosystems with High-Speed Transfer Platform

Aspera, Inc. on Tuesday announced that its patented fasp transport technology will be demonstrated as part of numerous partner solutions at NAB 2012. Aspera enables a growing ecosystem of partners in the areas of cloud computing, network-attached storage and digital media production and delivery, where leading technology suppliers bring high-performance transport capabilities to their products, systems and services by building upon the Aspera platform. A pioneer in the enablement of high-speed data-intensive workflows throughout the enterprise, Aspera has now unlocked the cloud for big data with its industry-leading high-speed transport solutions. Amazon Web Services and Aspera offer combined solutions for high-performance storage, processing and distribution in the cloud, allowing media companies large and small to take full advantage of integrated media workflows... (more)

Webinar: Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing (April 26)

Join us for what will be a very informative webinar on Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing April 26th 2012 – Time: 10:00 AM PDT, 1:00 PM EDT > Register Now Employees love the convenience and utility of collaborative file sharing applications like Box. Sharing contracts, graphics/video files, or other corporate content using a cloud-based service empowers users to share information directly with external partners-outside traditional enterprise security controls. While you want to encourage productivity, you also need a strategy that addresses how you’re going to control access to file sharing applications and inspect data before it leaves the enterprise. In this webinar Intel, McAfee and Box join forces to discuss how your sensitive content can be protected throughout the collaboration life cycle—from access and up... (more)

Box Adds Technology Veteran Board Member and Senior Executive Leadership to Fuel Enterprise Growth

LOS ALTOS, CA -- (Marketwire) -- 05/10/12 -- Box today announced the addition of three senior executives, expanding its powerhouse of talent and further bolstering its plans for rapid growth in the enterprise market. Joining Box are Dana Evan, newly appointed independent director to the Box Board of Directors; Peter McGoff, general counsel and corporate secretary; and Tom Addis, senior vice president of enterprise sales. "We want to transform how every business in the world manages information and collaboration in the cloud, and we're assembling a world class board and leadership team to help realize our vision," said Aaron Levie, co-founder and CEO of Box. "Dana, Pete and Tom bring a wealth of enterprise experience to Box, and will be key players in fueling the next stage of our growth." Building on a record 2011, which included major new customers AAA, Dow Chemica... (more)

Application-Aware Firewalls

[by Andy Thurai] "Application-Aware Firewalls."You may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level security unless either you are the developer, admin, or user of those specific services or perhaps a hacker. Especially when your traditional network boundaries disappear you can’t carry all of those devices with you. When you move out of your traditional boundaries, towards the cloud, you trust the cloud provider to provide you these features. But you can’t do the same with application level security.  That is because those devices work on a level below the Application Layer (Or Layer 7 in the ISO-OSI architecture model). And those standards are very well define... (more)

To MDM or Not to MDM?

If your company is planning to implement MDM (Mobile Device Management) it may get a strong feeling of getting stifled at work. This would especially be true if your phone is not company provided. And you would be justified. On the other hand your company is also justified in wanting to ensure the security of its network and its corporate data. Nothing short of these draconian measures can really be secure enough. So… If the gap between what the organization want and what you would feel comfortable with is so large, how do we find a common ground? MDM products need to evolve a lot to bridge the gap. Till then you may not see large scale adoption. Quick test How many of these acronyms can you expand? MDM, MAM, MIM, BYOD, BYOC, BYOT and TEM – The expansions at the end of this post. What would MDM mean to you? Hand over complete control: Would you want give full contr... (more)