Access "McAfee product strategy needs focus, analysts say"
This article is part of the November 2010 issue of Meeting cloud computing compliance mandates
At McAfee's annual user conference in September, executives at the security vendor set out to assure customers and partners that they have a clear product strategy as the company enters into marriage with Intel. The multi-pronged plan drew customer interest but industry observers say the security giant needs to hone its priorities if it wants to succeed. While it isn't likely that innovative hardware-based security products will be released this year, McAfee President and CEO Dave DeWalt hinted just weeks after Intel announced its plan to acquire the company that new technologies are already in the pipeline. Until then, he said the company would continue to innovate with its software-based endpoint security initiatives. His message resonated with some McAfee customers who expressed their interest in the prospects of hardware-based security and McAfee's new virtualization platform,, an antivirus software package called MOVE that secures XenDesktop virtual machines and VMware servers. Tom VanderZwaag, a security solution center manager at Santa Clara, Calif.-... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
McAfee product strategy needs focus, analysts say
Slew of McAfee product initiatives pique interest of customers but industry analysts say the security giant needs to sharpen its focus.
-
Information security professionals on their pay, certifications
The economy is dragging down pay for information security professionals but not dampening their dedication.
-
McAfee product strategy needs focus, analysts say
-
-
Due diligence processes for cloud computing compliance
Moving IT operations to the cloud requires careful due diligence to maintain compliance with HIPAA, GLBA and other regulations.
-
How to use an automated user provisioning system for access control
by Randall Gamby, Contributor
Re-architect your provisioning system into a first line of defense for access management.
-
Due diligence processes for cloud computing compliance
-
Columns
-
Microsoft security proposal is noble, but no way
To cure the botnet plague, Microsoft wants to quarantine infected consumer PCs until they're remediated.
-
The Application Security Testing Gap
by C. Warren Axelrod
Application security reviews miss a critical vulnerability by not ensuring functional security.
-
Schneier-Ranum Face-Off on the dangers of a software monoculture
Security experts Bruce Schneier and Marcus Ranum debate the impact of a software monoculture on computer security.
-
Microsoft security proposal is noble, but no way
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO