Feeds

McAfee upgrades cloud security and Intel identity kit

Free to customers and channel

Choosing a cloud hosting partner with confidence

McAfee has upgraded its enterprise Cloud Security Platform and activated the first in a series of integrations with parent company Intel's identity management systems.

The security company has beefed up data loss systems to cover email and web gateways and added in a simplified management control and reporting panel that allow common policy and control settings across hybrid clouds and on-premises systems. New context-aware software locks systems down further and provides real-time feedback.

Mobile users are also getting an update, with web protection software that reroutes laptop traffic through either the company's own web gateway or via a cloud provider to ensure security policies are consistently followed. The varied working styles and locations of mobile workers increases the likelihood of a security breach, Anne Aarness, McAfee senior product marketing manager, told The Register.

McAfee's ePolicy Orchestrator (ePO) administration is also getting a major upgrade to incorporate Intel's cloud single sign-on (SSO) technology, which sets up a secure portal for individual users to access cloud applications, built on Salesforce's Force.com platform.

Cloud SSO has a password generation application that works with Windows, Android, iOS and RIM for endpoints and allows a single password to manage authentication across all platforms and applications. Users get a single portal showing them what applications are available.

Intel is claiming hundreds of cloud applications will work with the system, with more on the way. Those users with Intel hardware can also use Chipzilla's identity protection technology that's built into the die.

“This is the starting point in the direction of the vision of how we can make sure that the transaction from the client to the cloud are secure,” Vikas Jain, director of product management for application security and identity products at Intel, told The Register last month. “This is just phase one of that and more contextual elements will come in the future.” ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.