Feeds

McAfee.com to shift 1m units on P2P piggyback

Blubster joins Morpheus

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

ComputerWire: IT Industry Intelligence

McAfee.com Corp reckons it can grow its user base by over one million in the course of the current quarter, after striking deals with two major peer-to-peer file-trading software developers,

Kevin Murphy writes

. The company said its recently launched SecurityCenter application will ship with Blubster and Morpheus clients, which are in use by tens of millions of consumers.

SecurityCenter is McAfee.com's free threat-assessment application, a loss leader that entices users to sign up for the company's subscription-based antivirus, firewall and spam filtering services. The company did not say how high it expects its conversion rates to be with the new channels, and spokespeople were not available for comment.

Blubster is a Spanish-language Napster-alike that allows a current three million consumers to swap music files, owned by Madrid-based OptiSoft SL. Morpheus, created by StreamCast Networks Inc of Franklin, Tennessee, allows more types of files to be traded, and has been downloaded about 100 million times, according to the company.

There is a real need for antivirus software when you're running a P2P file swapping application. In addition to existing file infectors, there are worms specifically designed to spread over P2P networks. The Gspot.exe worm, discovered last year, tailored itself to appear to be whatever the user was searching for on the Gnutella network.

McAfee.com CEO Srivats Sampath said in a statement: "We view the file-sharing community, and especially Morpheus, as an important market moving forward as these networks become more popular and file sharing simultaneously becomes more dangerous."

The SecurityCenter network itself is marketed by McAfee.com as a "grid" service, a buzzword cousin of "P2P". Each instance of SecurityCenter is designed to be a node in a network of millions of machines that exchange data with a central database that tracks ongoing attacks and virus outbreaks in real-time.

The deals are the latest in a string of good news from McAfee.com in recent months. The company will also distribute its software with the next versions of America Online Inc's services and Microsoft Corp's MSN. The company expects to triple the number of paying subscribers by the end of next year.

© ComputerWire

Related story

Morpheus bundles McAfee.com info in P2P client

Morpheus bundles McAfee.com info in P2P client

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.