|By Business Wire||
|February 25, 2014 12:01 AM EST||
RSA CONFERENCE – McAfee today announced a technology partnership with Tanium, Inc. to provide enhanced McAfee Real Time technology. McAfee Real Time Command enriches security and systems management with instant visibility into system data and immediate intervention ability. This product empowers administrators to manage incident responses, outbreaks, current patching levels, security policies, and software compliance proactively. Enterprises today need up-to-the-second information to identify and resolve security issues within minutes versus days – the McAfee/Tanium partnership is the only product that fulfills that need at enterprise scale.
Other systems management tools are unable to provide the time-sensitive data enterprises need in order to efficiently prevent and respond to threats and outages. According to the 2013 Verizon Data Breach Report, 69 percent of breaches went from initial compromise to data exfiltration within hours. Conversely, over a third of breaches took weeks to months resolve.1 To minimize the damage of attacks and protect the business, it is essential that security analysts are able to quickly identify attacks, determine the root cause and remediate the threat. McAfee Real Time Command delivers an extensible enterprise platform for deep insight into the critical endpoint data to identify threats, including information about running processes, hashes of files, established network connections, user activity, configuration information, and more as well as the ability to instantly take action in response.
“Time is everything when it comes to stopping threats,” said Orion Hindawi, chief technology officer at Tanium. “By the time the problem is discovered, the damage has been done, and threats have spread throughout the environment. Together with McAfee, we’re helping businesses rapidly expose and stop these threats before they infiltrate the environment. We’re helping them pivot from being the hunted to being the hunter.”
McAfee Real Time Command Capabilities:
- Instant querying: Query every endpoint in your environment and get answers back within seconds. The ability to gather data quickly is essential when an organization is confronted with outages, viruses, or zero-day vulnerabilities. McAfee Real Time Command empowers organizations to both detect and respond to incidents instantly.
- Instant actions: The instant querying capability enables enterprises to identify and diagnose problems as they occur, but organizations also need the ability to take action at light speed. McAfee Real Time Command delivers immediate action so IT administrators can make changes across an entire network within seconds.
- Plain English: McAfee Real Time Command gives users the ability to ask questions in plain English, instead of having to learn a complex scripting language. IT administrators can simply ask questions and get answers back in seconds.
- Enterprise ready: McAfee Real Time Command includes features critical to enterprise security and scalability, including FIPS-ready cryptography, rigorous management rights, large-scale support for administrators and managed assets.
- Simple infrastructure: Based on its innovative network topology, McAfee Real Time Command uses a single server to manage globally distributed networks and large organizations, simplifying deployment and reducing costs.
"IT professionals know that seconds can mean the difference between a successful attack and a blocked one,” said Ryan Allphin, senior vice president and general manager of the security management business unit at McAfee. “By utilizing the Tanium technology we’re able to eliminate costly manual effort and provide immediate data collection and action capabilities, with McAfee Real Time Command. This allows users to focus on what data to collect and why it is important, by providing answers within seconds. This provides huge benefits to the security and efficiency of an organization.”
The McAfee Real Time Command solution is another key element of the McAfee Security Connected platform of integrated, intelligent and connected security solutions that are needed in the battle against advanced threats.
McAfee Real Time Command is available now. For more information visit: www.mcafee.com/securitymanagement.
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com
Tanium was founded in 2007 by a team with extensive experience providing systems management capabilities to Fortune 500 customers. Having worked closely with some of the largest, most carefully managed enterprises in the world, Tanium’s founding team knows how hard it can be to keep a large network environment running smoothly.
Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.
The information contained in this document is for informational purposes only and should not be deemed an offer by McAfee or create an obligation on McAfee. McAfee reserves the right to discontinue products at any time, add or subtract features or functionality, or modify its products, at its sole discretion, without notice and without incurring further obligations.
1 2013 Data Breach Investigations Report, Verizon, http://www.verizonenterprise.com/DBIR/2013/
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Sep. 28, 2016 09:45 AM EDT Reads: 5,088
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Sep. 28, 2016 09:15 AM EDT Reads: 1,052
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Sep. 28, 2016 09:15 AM EDT Reads: 3,155
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Sep. 28, 2016 09:00 AM EDT Reads: 2,634
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software sec...
Sep. 28, 2016 09:00 AM EDT Reads: 1,268
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
Sep. 28, 2016 09:00 AM EDT Reads: 2,747
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 09:00 AM EDT Reads: 3,841
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 28, 2016 08:45 AM EDT Reads: 1,201
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 28, 2016 08:45 AM EDT Reads: 1,124
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 28, 2016 08:45 AM EDT Reads: 2,546
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Sep. 28, 2016 08:30 AM EDT Reads: 1,571
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 28, 2016 08:30 AM EDT Reads: 1,153
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 28, 2016 08:15 AM EDT Reads: 537
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 28, 2016 08:00 AM EDT Reads: 2,056
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 28, 2016 08:00 AM EDT Reads: 2,430