McAfee provides 'vision,' but few details on Intel-specific security push

McAfee plans to release in midyear software it developed with parent company Intel that would secure personal data and provide online authentication across PCs, Macs, smartphones and tablets.

McAfee and Intel, which acquired the security vendor two years ago for $7.7 billion, announced the upcoming technology Monday at the Consumer Electronics Show (CES). McAfee, which held invitation-only demonstrations of the beta product, provided no details on the software.

"For a security company, they are keeping the details pretty damn secure," said Dan Olds, an analyst for the Gabriel Consulting Group.

In general, the McAfee technology would take advantage of antitheft, data encryption and other security features in Intel chips. All silicon-based technologies are available to other security vendors willing to license them from Intel.

McAfee is building on top of Intel-provided security to offer much more than what McAfee currently provides in it's All Access product, which includes antivirus, hardware identification for home networks and a variety of other security features. The product works across PCs, Macs and mobile devices.

"This is really taking All Access to a different level," said Gary Davis, vice president of consumer marketing for McAfee. "Having the deep integration with Intel technology and affording new levels of benefits and services that we haven't delivered before is really what this is all about."

[Bill Brenner in Salted Hash: McAfee-Intel eye critical infrastructure protection]

The new technology is not meant to replace All Access, Davis said. The product will have it own brand and will be available through retailers and PC makers that agree to preload it on new systems. Only Intel-based devices will be able to take advantage of all the features in the new product.

The fact that the technology would only be 100 percent useful on Intel-based smartphones and tablets is a problem because very few of those devices use Intel processors, Olds said. Most run on ARM chips.

In place of details, Davis provided "visionary" statements on what the technology could do. For example, biometric technology in a PC could be used to authenticate the user and link that person to the hardware. Once that is done, a person could make purchases from online retailers that support the technology without having to sign in.

"Those are some of the aspirational type of items that we're thinking about," Davis said. "The intent is to get consumers to the point where just by doing what they do, they're safe."

The product will take advantage of Intel's anti-theft technology for laptops that locks down a hard drive, so it can't be accessed when a system is loss or stolen. McAfee already takes advantage of this hardware-assisted security in other products.

An example of what the new McAfee product could do is lock down a device's hard drive or solid-state drive when the authenticated user steps away, Davis said.

McAfee has released business products that tap into security embedded in Intel hardware. For example, Deep Defender is McAfee technology that sits between the processor and operating system to detect rootkits, hidden malware that's often installed on the OS kernel or the Master Boot Record. Deep Defender is built on technology called DeepSAFE, developed jointly by McAfee and Intel.

Intel has said that it hopes security features from McAfee would help the chipmaker differentiate its mobile chips from ARM, which dominates the market for smartphones and tablets.

Read more about wireless/mobile security in CSOonline's Wireless/Mobile Security section.

Join the CSO newsletter!

Error: Please check your email address.

Tags mcafeeapplicationssecuritymobile securitysoftwareData Protection | Wirelessinteldata protection

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place