Risk
2/27/2013
11:59 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

McAfee Security Innovation Alliance Announces New Partners And Integrated Solutions

Eight other SIA partners promoted to Technology Partner status

SAN FRANCISCO--(BUSINESS WIRE)--RSA CONFERENCE -- McAfee today announced that 11 new partners have joined the McAfee Security Innovation Alliance (McAfee SIA). With more participants in SIA than in any other security alliance program, McAfee SIA is the security industry's premier technology-partnering program, delivering solutions to maximize the value of existing customer investments, while reducing time to problem resolution and lowering operational costs.

The new partners that have joined the McAfee Security Innovation Alliance are:

Asdeq Labs

BowBridge Software

DearBytes

iScan Online

Mocana

Monet+

Piolink

Raz-Lee Security

SafeNet

Taasera

WizNucleus

In addition, SIA partners Boldon James, Core Security, FoxT, HyTrust, LockPath, NetFort Technologies, and Tomium Software have been promoted to Technology Partner status in the McAfee SIA program, achieving "McAfee Compatible" status for their solutions.

Finally, McAfee welcomes Core Security, FoxT, Hitachi ID, HyTrust, LockPath, NetFort Technologies, Skybox Security, and Tomium Software to its SIA Sales Teaming Program. Partners in the SIA Sales Teaming Program complement the McAfee product portfolio and enable the McAfee sales force and channel to drive more complete security solution relationships with enterprise customers.

Customers continue to adopt security solutions to address their need for protection, and we often see heterogeneous environments that utilize a wide range of security products which have been deployed over years," said Ed Barry, vice president of the McAfee Security Innovation Alliance. "SIA intelligently leverages McAfee security know-how with expertise from new and established industry vendors to simplify the integration and management of security products in mixed environments."

For more information about how partners are working with McAfee, please visit the partner directory page.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.pIFfnpsc.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-5704
Published: 2014-04-15
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

CVE-2013-5705
Published: 2014-04-15
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.

CVE-2014-0341
Published: 2014-04-15
Multiple cross-site scripting (XSS) vulnerabilities in PivotX before 2.3.9 allow remote authenticated users to inject arbitrary web script or HTML via the title field to (1) templates_internal/pages.tpl, (2) templates_internal/home.tpl, or (3) templates_internal/entries.tpl; (4) an event field to ob...

CVE-2014-0342
Published: 2014-04-15
Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX before 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.

CVE-2014-0348
Published: 2014-04-15
The Artiva Agency Single Sign-On (SSO) implementation in Artiva Workstation 1.3.x before 1.3.9, Artiva Rm 3.1 MR7, Artiva Healthcare 5.2 MR5, and Artiva Architect 3.2 MR5, when the domain-name option is enabled, allows remote attackers to login to arbitrary domain accounts by using the corresponding...

Best of the Web