Feeds

McAfee upgrades cloud security and Intel identity kit

Free to customers and channel

Security for virtualized datacentres

McAfee has upgraded its enterprise Cloud Security Platform and activated the first in a series of integrations with parent company Intel's identity management systems.

The security company has beefed up data loss systems to cover email and web gateways and added in a simplified management control and reporting panel that allow common policy and control settings across hybrid clouds and on-premises systems. New context-aware software locks systems down further and provides real-time feedback.

Mobile users are also getting an update, with web protection software that reroutes laptop traffic through either the company's own web gateway or via a cloud provider to ensure security policies are consistently followed. The varied working styles and locations of mobile workers increases the likelihood of a security breach, Anne Aarness, McAfee senior product marketing manager, told The Register.

McAfee's ePolicy Orchestrator (ePO) administration is also getting a major upgrade to incorporate Intel's cloud single sign-on (SSO) technology, which sets up a secure portal for individual users to access cloud applications, built on Salesforce's Force.com platform.

Cloud SSO has a password generation application that works with Windows, Android, iOS and RIM for endpoints and allows a single password to manage authentication across all platforms and applications. Users get a single portal showing them what applications are available.

Intel is claiming hundreds of cloud applications will work with the system, with more on the way. Those users with Intel hardware can also use Chipzilla's identity protection technology that's built into the die.

“This is the starting point in the direction of the vision of how we can make sure that the transaction from the client to the cloud are secure,” Vikas Jain, director of product management for application security and identity products at Intel, told The Register last month. “This is just phase one of that and more contextual elements will come in the future.” ®

Internet Security Threat Report 2014

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Desktop Linux users beware: the boss thinks you need to be managed
VMware reveals VDI for Linux desktops plan, plus China lab to do the development
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.