Risk
2/27/2013
11:59 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

McAfee Security Innovation Alliance Announces New Partners And Integrated Solutions

Eight other SIA partners promoted to Technology Partner status

SAN FRANCISCO--(BUSINESS WIRE)--RSA CONFERENCE -- McAfee today announced that 11 new partners have joined the McAfee Security Innovation Alliance (McAfee SIA). With more participants in SIA than in any other security alliance program, McAfee SIA is the security industry's premier technology-partnering program, delivering solutions to maximize the value of existing customer investments, while reducing time to problem resolution and lowering operational costs.

The new partners that have joined the McAfee Security Innovation Alliance are:

Asdeq Labs

BowBridge Software

DearBytes

iScan Online

Mocana

Monet+

Piolink

Raz-Lee Security

SafeNet

Taasera

WizNucleus

In addition, SIA partners Boldon James, Core Security, FoxT, HyTrust, LockPath, NetFort Technologies, and Tomium Software have been promoted to Technology Partner status in the McAfee SIA program, achieving "McAfee Compatible" status for their solutions.

Finally, McAfee welcomes Core Security, FoxT, Hitachi ID, HyTrust, LockPath, NetFort Technologies, Skybox Security, and Tomium Software to its SIA Sales Teaming Program. Partners in the SIA Sales Teaming Program complement the McAfee product portfolio and enable the McAfee sales force and channel to drive more complete security solution relationships with enterprise customers.

Customers continue to adopt security solutions to address their need for protection, and we often see heterogeneous environments that utilize a wide range of security products which have been deployed over years," said Ed Barry, vice president of the McAfee Security Innovation Alliance. "SIA intelligently leverages McAfee security know-how with expertise from new and established industry vendors to simplify the integration and management of security products in mixed environments."

For more information about how partners are working with McAfee, please visit the partner directory page.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.pIFfnpsc.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web