Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

10/12/2010
05:19 PM
Rob Enderle
Rob Enderle
Commentary
50%
50%

A Peek At The Intel-McAfee Strategy

This week is McAfee's annual customer and partner event, and the first one since the announcement that Intel would acquire McAfee. The message at Focus is that the Intel-McAfee plan to secure all parts of the emerging highly distributed and massively diverse ecosystem -- from devices such as smartphones and tablets to large-scale virtualized servers -- in what is increasingly a SaaS and virtualized environment.

This week is McAfee's annual customer and partner event, and the first one since the announcement that Intel would acquire McAfee. The message at Focus is that the Intel-McAfee plan to secure all parts of the emerging highly distributed and massively diverse ecosystem -- from devices such as smartphones and tablets to large-scale virtualized servers -- in what is increasingly a SaaS and virtualized environment.Here are some of the high points from McAfee Focus 10:

Into Silicon What Intel brings to the table is the ability to design security into the silicon. That's important because there isn't enough performance overhead in handheld devices to run a heavy security stack without excessively impacting performance. And in a virtualized world, you have to operate above and below the virtualized layer and aggressively protect against the VM platform getting infected. Software will be part of this by hard-coding into the silicon. It is believed that a level of blended protection can be provided that goes well beyond what software alone can do both in terms of performance and invulnerability to attack.

This will not be simple or fast, but by being able to go where no other firm can go, it should provide McAfee with a long-term strategic advantage against other offerings once it is done and brought to market. I would expect initial benefits to be at least a year out, and given silicon design times, the full potential of this approach won't be realized until years later. Common Policies And Control Panels Like most large security firms, McAfee is showcasing an integrated approach to security management. The idea of rolled up reporting and common management consoles has been the dream of both the security firms and those attempting to manage an increasingly diverse ecosystem. McAfee showcased one of the first coordinated security defenses for iPhone and iPad product at one end, rogue access points in the middle, and massive virtualized server structures in the cloud. Some of this is done -- like the management and identification of rogue access points -- by partners. Some of these partners could represent potential acquisition targets for the future because we are clearly on a path across the technology industry for vertical integration.

Mobile To Embedded A new addition to this breadth of offerings from a major firm is coverage for cell phones. Through two acquisitions, McAfee had begun to integrate core security functions into mobile phones. With expertise on iPhone, Android, and Windows phones, McAfee is unique when it comes to large security firms covering mobile phones.

On the consumer side, the offering allows for Web-based tracking of phone activity, antivirus protection for the phone, remote wipe, and location capability.

Corporate products add encryption, centralized management, and application-based configuration. This allows a user to take his new phone to a website, identify himself, and then run a one-time application that fully configures his phone for IT services and security.

These mobile applications, which forced the company to learn diverse operating systems, has created an opportunity to create security technology for embedded systems like ATMs and coming connected automotive systems. This last is one of the primary reasons that Intel bought the company a few months ago.

Move Antivirus For Virtual Desktops One of the fastest-growing areas is virtualized desktops. The promise of this new environment is a terminal-like administration experience coupled with a PC-like user experience. The problem is you are still dealing with a PC platform at the end of the day, and that means virus scans and other forms of security are a requirement.

But a virtualized environment is one in which the resources are shared and where these resources are constantly optimized. Can you imagine what would happen if a large number of virus scans start at once? On the other hand, if a virus is identified, then the elimination of the virus could be far quickly if you can take into account the shared efficiencies of combined network storage.

Move Antivirus is the first solution I've yet to see that is designed to operate in the unique and new virtualized desktop environment.

So McAfee is at an interesting place. It is moving aggressively on new market opportunities in the mobile, embedded, and virtualized space, while recognizing the need early on to connect all of this together. You can see why Intel bought the firm: There is no other security firm already working on or deploying products in these new areas.

In the end, a business needs to be able to comprehensively look at all of its exposed areas, and while no firm can yet, or likely ever, do that, McAfee is working to assure it is the most complete of the major firms. That would appear to be beneficial to both the business of today and the one that is emerging in the mobile, virtualized world of tomorrow.

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7989
PUBLISHED: 2020-01-26
Adive Framework 2.0.8 has admin/user/add userUsername XSS.
CVE-2020-7990
PUBLISHED: 2020-01-26
Adive Framework 2.0.8 has admin/user/add userName XSS.
CVE-2020-7991
PUBLISHED: 2020-01-26
Adive Framework 2.0.8 has admin/config CSRF to change the Administrator password.
CVE-2020-7984
PUBLISHED: 2020-01-26
SolarWinds N-central before 12.1 SP1 HF5 and 12.2 before SP1 HF2 allows remote attackers to retrieve cleartext domain admin credentials from the Agent & Probe settings, and obtain other sensitive information. The attacker can use a customer ID to self register and read any aspects of the agent/a...
CVE-2019-16029
PUBLISHED: 2020-01-26
A vulnerability in the application programming interface (API) of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to change user account information which can prevent users from logging in, resulting in a denial of service (DoS) condition of the web interface. Th...