Feeds

McAfee upgrades cloud security and Intel identity kit

Free to customers and channel

Application security programs and practises

McAfee has upgraded its enterprise Cloud Security Platform and activated the first in a series of integrations with parent company Intel's identity management systems.

The security company has beefed up data loss systems to cover email and web gateways and added in a simplified management control and reporting panel that allow common policy and control settings across hybrid clouds and on-premises systems. New context-aware software locks systems down further and provides real-time feedback.

Mobile users are also getting an update, with web protection software that reroutes laptop traffic through either the company's own web gateway or via a cloud provider to ensure security policies are consistently followed. The varied working styles and locations of mobile workers increases the likelihood of a security breach, Anne Aarness, McAfee senior product marketing manager, told The Register.

McAfee's ePolicy Orchestrator (ePO) administration is also getting a major upgrade to incorporate Intel's cloud single sign-on (SSO) technology, which sets up a secure portal for individual users to access cloud applications, built on Salesforce's Force.com platform.

Cloud SSO has a password generation application that works with Windows, Android, iOS and RIM for endpoints and allows a single password to manage authentication across all platforms and applications. Users get a single portal showing them what applications are available.

Intel is claiming hundreds of cloud applications will work with the system, with more on the way. Those users with Intel hardware can also use Chipzilla's identity protection technology that's built into the die.

“This is the starting point in the direction of the vision of how we can make sure that the transaction from the client to the cloud are secure,” Vikas Jain, director of product management for application security and identity products at Intel, told The Register last month. “This is just phase one of that and more contextual elements will come in the future.” ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.