Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/4/2017
12:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

McAfee's Back as an Independent Security Firm

Security firm is no longer part of Intel Corp.

McAfee has finalized its planned spinoff from Intel Corp. and as of today returned to its roots as a stand-alone security company.

The move to separate the company was first announced by Intel in September, when the chip company revealed that it planned to sell a majority stake in its McAfee subsidiary to TPG for $3.1 billion after what industry analysts considered a failed investment. Intel purchased McAfee for $7.7 billion in August 2010 in hopes of providing it a security foothold in areas such as wireless mobility and the Internet of Things.

But the combination of Intel and McAfee didn't pan out the way either company had hoped. McAfee said today that the final spinoff deal closed at a value of $4.2 billion, with TPG adding Thomas Bravo as a minority investor in McAfee. Intel, as planned, will retain a 49% stake in McAfee.

The former Intel Security arm's general manager Christopher Young will serve as CEO of the new privately held McAfee.

Steve Grobman, CTO of McAfee and former CTO at Intel Security, says the spinoff allows McAfee to operate more nimbly. "We came to the conclusion that given the pace of changes [in cybersecurity threats] McAfee needs a level of agility to build technology at a rate and pace that matches the threat landscape," Grobman said in an interview with Dark Reading. "As compared with a semiconductor manufacturing company, there's a different technical discipline. The spinout is really about giving both companies the ability to get a lot more focused on our core competency."

It's less about changing direction in strategy for McAfee and more about speeding up the direction it began two years ago with the arrival of Young to Intel Security, Grobman says.

McAfee will continue its security platform focus, as well as moving to cloud security capabilities, he says.

"We are building out our portfolio to adapt to the way the industry is shifting," he says. "As the industry is embracing cloud more aggressively, we're shifting capabilities to the cloud as well."

The new McAfee, which also unveiled a new logo today, will have between 7,500- to 8,000 employees.

"We offer Chris Young and the McAfee team our full support as they establish themselves as one of the largest pure-play cybersecurity companies in the industry," Brian Krzanich, Intel CEO, said in a statement. "Security remains important to Intel, and in addition to our equity position and ongoing collaboration with McAfee, Intel will continue to integrate industry-leading security and privacy capabilities in our products from the cloud to billions of smart, connected computing devices."          

Related Content: 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
4/6/2017 | 11:47:41 AM
When M&As are too far reaching
I remember thinking when Intel bought McAfee: "A competitor just disappeared."  But i never thought i would be so spot on.  It is nice to see that McAfee is back with a new focus and a strong leadership.
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
4/6/2017 | 11:46:15 AM
When M&As are too far reaching
I remember thinking when Intel bought McAfee: "A competitor just disappeared."  But i never thought i would be so spot on.  It is nice to see that McAfee is back with a new focus and a strong leadership.
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I like the old version of Google assistant much better.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...