Risk
2/27/2013
11:59 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

McAfee Security Innovation Alliance Announces New Partners And Integrated Solutions

Eight other SIA partners promoted to Technology Partner status

SAN FRANCISCO--(BUSINESS WIRE)--RSA CONFERENCE -- McAfee today announced that 11 new partners have joined the McAfee Security Innovation Alliance (McAfee SIA). With more participants in SIA than in any other security alliance program, McAfee SIA is the security industry's premier technology-partnering program, delivering solutions to maximize the value of existing customer investments, while reducing time to problem resolution and lowering operational costs.

The new partners that have joined the McAfee Security Innovation Alliance are:

Asdeq Labs

BowBridge Software

DearBytes

iScan Online

Mocana

Monet+

Piolink

Raz-Lee Security

SafeNet

Taasera

WizNucleus

In addition, SIA partners Boldon James, Core Security, FoxT, HyTrust, LockPath, NetFort Technologies, and Tomium Software have been promoted to Technology Partner status in the McAfee SIA program, achieving "McAfee Compatible" status for their solutions.

Finally, McAfee welcomes Core Security, FoxT, Hitachi ID, HyTrust, LockPath, NetFort Technologies, Skybox Security, and Tomium Software to its SIA Sales Teaming Program. Partners in the SIA Sales Teaming Program complement the McAfee product portfolio and enable the McAfee sales force and channel to drive more complete security solution relationships with enterprise customers.

Customers continue to adopt security solutions to address their need for protection, and we often see heterogeneous environments that utilize a wide range of security products which have been deployed over years," said Ed Barry, vice president of the McAfee Security Innovation Alliance. "SIA intelligently leverages McAfee security know-how with expertise from new and established industry vendors to simplify the integration and management of security products in mixed environments."

For more information about how partners are working with McAfee, please visit the partner directory page.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.pIFfnpsc.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web