Welcome!

News Feed Item

McAfee and Tanium Team Up to Deliver Enhanced Real Time Technology with Instant, Actionable Visibility

RSA CONFERENCE McAfee today announced a technology partnership with Tanium, Inc. to provide enhanced McAfee Real Time technology. McAfee Real Time Command enriches security and systems management with instant visibility into system data and immediate intervention ability. This product empowers administrators to manage incident responses, outbreaks, current patching levels, security policies, and software compliance proactively. Enterprises today need up-to-the-second information to identify and resolve security issues within minutes versus days – the McAfee/Tanium partnership is the only product that fulfills that need at enterprise scale.

Other systems management tools are unable to provide the time-sensitive data enterprises need in order to efficiently prevent and respond to threats and outages. According to the 2013 Verizon Data Breach Report, 69 percent of breaches went from initial compromise to data exfiltration within hours. Conversely, over a third of breaches took weeks to months resolve.1 To minimize the damage of attacks and protect the business, it is essential that security analysts are able to quickly identify attacks, determine the root cause and remediate the threat. McAfee Real Time Command delivers an extensible enterprise platform for deep insight into the critical endpoint data to identify threats, including information about running processes, hashes of files, established network connections, user activity, configuration information, and more as well as the ability to instantly take action in response.

“Time is everything when it comes to stopping threats,” said Orion Hindawi, chief technology officer at Tanium. “By the time the problem is discovered, the damage has been done, and threats have spread throughout the environment. Together with McAfee, we’re helping businesses rapidly expose and stop these threats before they infiltrate the environment. We’re helping them pivot from being the hunted to being the hunter.”

McAfee Real Time Command Capabilities:

  • Instant querying: Query every endpoint in your environment and get answers back within seconds. The ability to gather data quickly is essential when an organization is confronted with outages, viruses, or zero-day vulnerabilities. McAfee Real Time Command empowers organizations to both detect and respond to incidents instantly.
  • Instant actions: The instant querying capability enables enterprises to identify and diagnose problems as they occur, but organizations also need the ability to take action at light speed. McAfee Real Time Command delivers immediate action so IT administrators can make changes across an entire network within seconds.
  • Plain English: McAfee Real Time Command gives users the ability to ask questions in plain English, instead of having to learn a complex scripting language. IT administrators can simply ask questions and get answers back in seconds.
  • Enterprise ready: McAfee Real Time Command includes features critical to enterprise security and scalability, including FIPS-ready cryptography, rigorous management rights, large-scale support for administrators and managed assets.
  • Simple infrastructure: Based on its innovative network topology, McAfee Real Time Command uses a single server to manage globally distributed networks and large organizations, simplifying deployment and reducing costs.

"IT professionals know that seconds can mean the difference between a successful attack and a blocked one,” said Ryan Allphin, senior vice president and general manager of the security management business unit at McAfee. “By utilizing the Tanium technology we’re able to eliminate costly manual effort and provide immediate data collection and action capabilities, with McAfee Real Time Command. This allows users to focus on what data to collect and why it is important, by providing answers within seconds. This provides huge benefits to the security and efficiency of an organization.”

The McAfee Real Time Command solution is another key element of the McAfee Security Connected platform of integrated, intelligent and connected security solutions that are needed in the battle against advanced threats.

Availability

McAfee Real Time Command is available now. For more information visit: www.mcafee.com/securitymanagement.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

About Tanium

Tanium was founded in 2007 by a team with extensive experience providing systems management capabilities to Fortune 500 customers. Having worked closely with some of the largest, most carefully managed enterprises in the world, Tanium’s founding team knows how hard it can be to keep a large network environment running smoothly.

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

The information contained in this document is for informational purposes only and should not be deemed an offer by McAfee or create an obligation on McAfee. McAfee reserves the right to discontinue products at any time, add or subtract features or functionality, or modify its products, at its sole discretion, without notice and without incurring further obligations.

1 2013 Data Breach Investigations Report, Verizon, http://www.verizonenterprise.com/DBIR/2013/

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...