McAfee outlines the future of business security
Posted on 22 January 2013.
McAfee announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better protection from new types of attacks.


McAfee will expand its current broad portfolio through strategic acquisitions, development projects and key partnerships to deliver more integrated solutions and comprehensive protection across mobile devices, endpoints, servers, and network through an extensible framework.

When organizations deploy many separate technologies, gaps are created which lead to breaches and compliance violations and allows attacks to happen. Last year, attacks such as Flame and Shamoon exposed vulnerabilities in the point security product approach.

Additionally, the biggest day-to-day cost driver for organizations is operations including managing multiple security consoles, numerous policies and rules, and constant updates. To tackle these inefficient silos, Security Connected delivers business efficiency, predictability and actionable information.

“Security is now a boardroom level discussion,” said Michael Fey, chief technology officer at McAfee. “The stakes are high, and businesses require a new model that gives them a comprehensive picture of their entire IT infrastructure. The industry has been built on a historical thought process that will not support the demands of the future. We must move to having a real-time understanding and response capability if we are to meet the needs of the future.”

McAfee Security Connected brings network and endpoint together through an extensible framework, centralized management and integrated with global threat intelligence delivers unprecedented visibility across all threat vectors. At the core of McAfee Security Connected are the principles of integrated solutions, built-in intelligence, and advanced management offered with an extensible architecture for partners that no other vendor can provide.





Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //