Liste des partenaires SIA

Liste des partenaires SIA



Partenaire SIA Description McAfee Compatible
Absolute ID

Absolute ID is an innovative provider of data-centric protection products and services. Every Absolute ID solution employs proprietary cryptography technology that creates sophisticated, highly secure data files; dramatically enhances data availability, confidentiality, and integrity; and prevents unauthorized access or theft of digital data while lowering total cost of ownership.

Absolute ID has integrated its Virtual System on a Stick (ViSoS) with McAfee’s Encrypted USB drives. By combining ViSoS with any standards-based network, users now have the ability to securely collaborate with colleagues, business partners, supply chains, and with the controlled distribution mechanisms inherent in Absolute ID’s ViSoS solution. Read the solution brief for more details.

McAfee Compatible solution:
Absolute ID Virtual System on a Stick (ViSoS) and McAfee Encrypted USB.

AET

The Dutch company A.E.T. Europe B.V. (AET), headquartered in Arnhem and founded in 1998, is committed to IT security. AET is setting new standards in the crucial business area of developing middleware and card management systems for smart cards and USB tokens with its SafeSign Identity Client and BlueX digital ID management.

The combination of SafeSign Identity Client (IC) and McAfee Endpoint Encryption pre-boot authentication integrates authentication, access control, and hard disk encryption. Customers using smart cards or USB tokens for local access control at the McAfee secured client can add applications to the smart card or USB token as the demand grows, without having to change the smart cards, USB tokens, or client infrastructure.

McAfee Compatible solution:
McAfee Endpoint Encryption 6.1 and AET SafeSign Evonik (Smart Card).

Agiliance

Agiliance is a leading independent provider of Governance, Risk and Compliance (GRC) solutions. Delivered on-demand or on-premise, Agiliance GRC technology minimizes manual auditing through scalable automation to enable closed loop risk management and continuous compliance. Agiliance customers use real-time risk analysis to optimize business performance and make better investment decisions. Unlike legacy offerings that can take nearly a year to deploy, Agiliance’s Global 2000 and public sector customers deploying the RiskVision™ platform achieve demonstrable value within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance’s extensive library of technology integrations and GRC content. RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve exceptional risk and compliance coverage.

The McAfee portfolio of products automates the collection, testing and enforcement of security controls throughout the enterprise. Agiliance enables highly scalable, quickly deployable, organization-wide risk, compliance and security management in real-time. The McAfee Compatible integration of Agiliance RiskVision with McAfee ePO and McAfee Vulnerability Manager offers a unique, closed-loop risk management solution for risk-based security with exceptional accuracy and coverage. RiskVision is also interoperable with McAfee Policy Auditor, McAfee Risk Advisor, McAfee Endpoint Encryption and McAfee VirusScan Enterprise. Read the solution brief for more details.

McAfee Compatible solution:
Agiliance Risk Vision 4.0 and higher with McAfee ePO 4.5 and McAfee Vulnerability Manager 6.5 and higher.

AirPatrol Corporation

AirPatrol delivers wireless threat management solutions that empower customers to have total awareness of wireless 802.11 and cellular devices within their facility and total control over how corporate wireless and USB endpoint assets are used. The company’s comprehensive suite of location-based wireless security products enable security professionals in the government, financial, healthcare, corporate enterprise, and retail industries to keep pace with the expanding security requirements of an increasingly mobile world.

AirPatrol’s Wireless Policy Manager (WPM) extends the capabilities of McAfee’s ePolicy Orchestrator (ePO) platform into the wireless regime, giving network administrators the ability to manage, distribute, and enforce wireless network policies from their central ePO management console. AirPatrol’s WPM is specifically designed to secure wireless interfaces on endpoints and allows IT administrators to easily enforce common-sense rules that govern how employees use wireless resources. With WPM, organizations can secure valuable laptops and PCs against today’s wide range of mobile and wireless threats. Read the solution brief for more details.

McAfee Compatible solution:
AirPatrol WPM 1.0 and McAfee ePO 4.5 and 4.6.

Alcatel-Lucent

Alcatel-Lucent’s OmniAccess 3500 NLG enables enterprises to oversee the security on their mobile laptops and the data they contain 24/7, regardless of the power state of the laptop. The joint solution integrates the Alcatel-Lucent OmniAccess 3500 Nonstop Laptop Guardian (NLG) with McAfee Endpoint Encryption, delivering a powerful mobile security solution for lost and stolen laptops: strong encryption with remote wipe capabilities and GPS location for laptop recovery. Read the solution brief for more details.

McAfee Compatible solution:
McAfee Endpoint Encryption 5.4 and Alcatel-Lucent OmniAccess 3500 Nonstop Laptop Guardian (NLG). A wide range of PC platforms are supported. Please refer to McAfee’s release notes for platforms that have known issues.

AlgoSec

AlgoSec is a market leader in network security policy management. AlgoSec enables security and operations teams to intelligently automate the policy management of firewalls, routers, VPNs, proxies, and related security devices, improving operational efficiency, ensuring compliance, and reducing risk. More than 900 of the world’s leading enterprises, MSSPs, auditors, and consultancies rely on AlgoSec Security Management Suite for unmatched automation of firewall operations, auditing and compliance, risk analysis, and the security change workflow.

AlgoSec enables organizations running McAfee Firewall Enterprise to automate firewall management by ensuring correct policy configuration and continuous compliance. AlgoSec discovers unused and risky rules, automatically generates compliance reports, and automates the change workflow process to improve both security and operational efficiency. Read the solution brief for more details.

McAfee Compatible solution:
AlgoSec Security Management Suite 6.3 and McAfee Firewall Enterprise 7.0 and 8.2.

Allen Corporation of America

Allen Corporation of America provides cybersecurity research, technology, and training solutions to organizations and individuals tasked with detecting and investigating cybercrimes. Allen Corporation’s Advanced Threat Identification-Preemptive Defense (ATI-PD)™, efficiently enforces authorized use policies and protects against insider threats.

By leveraging the investments that organizations have made in McAfee endpoint protection suites, extending the one security agent and centralized management view provided by McAfee ePO, and utilizing the enforcement features of McAfee Host Intrusion Prevention, ATI-PD helps companies protect their critical assets and save time and money. ATI-PD leverages the signature database of one of the industry’s leading malware discovery tools for forensic investigations, WetStone Technologies™ Gargoyle Investigator™, enabling ATI-PD to detect and block the execution of thousands of malicious programs and tools in categories such as steganography, hacker toolkits, encryption, keyloggers, wireless surveillance, password crackers, and anti-forensics. Read the solution brief for more details.

McAfee Compatible solution:
Allen Corporation’s Advanced Threat Identification-Preemptive Defense (ATI-PD) software version 1.0 is integrated with McAfee Host Intrusion Prevention software version 7.0 and McAfee ePO 4.5, with McAfee Agent version 4.5 on Windows workstations and servers.

Allgress

Since 2008, Allgress has been helping risk and security professionals apply business risk context to security so that senior management can make informed decisions that align with top business priorities. Allgress provides Global 2000 organizations the insight to communicate and manage risk posture with a business focus to better evaluate the costs and benefits of remediating enterprise risks, security, and compliance. Unlike other risk management solutions, Allgress reduces the complexity to derive value in days instead of months by streamlining implementation, automating manual tasks, and providing effective visual management of the entire risk, security, and compliance process.

The Allgress Insight Risk Management Suite automates the collection of vulnerability data from the McAfee Risk Management solution through seamless integration to McAfee Vulnerability Manager. This enables comprehensive end-to-end lifecycle management of governing risk programs with recognized frameworks, standards, and best practices to align with top business priorities. The integrated solution allows for converging disparate risk silos so business stakeholders can easily gain immediate intuitive insight to understand and prioritize resources and budgets for more predictable business outcomes without an army of consultants.

Apperian

Apperian is the industry pioneer for mobile application management. Its cloud-based platform is the standard for managing corporate mobile apps and data in the enterprise. Unlike traditional approaches, Apperian protects and manages just what matters most -the actual apps and data- with a seamless user experience that doesn’t require intrusive technology on user devices. The solution ensures ongoing compliance with security policies and simplifies managing all stages of the mobile app lifecycle, streamlining the complexity of supporting ever-changing versions of apps, operating systems and devices — whether personal (BYOD) or corporate owned. Apperian powers the world’s leading enterprise app stores for hundreds of thousands of users.

Apperian and McAfee have joined forces to bring the power of mobile app management and security to McAfee customers without requiring cumbersome technology on user’s devices. Through McAfee’s ePolicy Orchestrator (ePO), insights into user’s app-level activity help mobile administrators drive the adoption of custom-built apps. Customers utilizing Apperian and ePO can centrally manage app-based policies that can be designed and applied to enterprise apps to ensure mobile compliance across the organization.

art of defense

Art of defence provides comprehensive application security technology for every scale. Its flagship product, hyperguard, is a pure software distributed web application firewall (dWAF) that protects web and cloud applications against known and unknown attacks at the application layer (such as OWASP Top10). Deployment scenarios of hyperguard range from plug-in into web servers or other web infrastructure components over virtual appliance to cloud-based SaaS. The company serves the financial services, ecommerce, technology, telecommunications, and public sector markets, helping its customers to comply with industry standards such as PCI and others.

Art of defence will integrate its dWAF solution, hyperguard, with the McAfee Web Gateway as a software plug-in. Hyperguard complements the content scanning and malware detection features of McAfee Web Gateway with its comprehensive web application attack detection and protection capabilities. Customers benefit from a complete inbound and outbound security solution in front of their web infrastructure to protect their web applications, including ecommerce and online banking, and web portals, such as Microsoft SharePoint and Outlook Web Access (OWA).

AsdeqLabs

AsdeqDocs®, from AsdeqLabs, is a powerful and intuitive enterprise mobile content management (EMCM) solution that enables the secure bidirectional distribution of sensitive corporate documents to and from a tablet device (iPad and Android). AsdeqDocs deeply integrates with an enterprise’s existing IT infrastructure, security policies, and business practices, allowing mobile users the ability to access documents stored within an extensive suite of common backend enterprise document repositories.

AsdeqDocs is fully offline enabled, and stores documents on the device within a highly secure custom container. AsdeqDocs turns what until now has been seen as largely a consumer-oriented device, into a secure, powerful, and productive tool for business users. In the McAfee Security Innovation Alliance program, AsdeqDocs will be integrated with McAfee Enterprise Mobility Management.

Authernative

Authernative provides innovative user authentication solutions enabling secure mobile, online, and cloud access. Its AuthGuard® versatile authentication server offers a range of multi-factor authentication options based on random partial shared-secret recognition. AuthGuard’s enhanced password, pattern-based one-time PIN, and out-of-band and mobile client user authentication methods provide scalable security, high usability, electronic mass deployment, lower TCO, and device/platform independency.

Authernative will integrate its AuthGuard® server auditing services which accompany its best-in-class authentication with the McAfee ePolicy Orchestrator (McAfee ePO) platform. Authernative and McAfee offer a complementary solution for tracking and auditing strong user authentication options and user authentication events.

Autonomic Software

Autonomic Software develops autonomic desktop management, security, and power management solutions. Autonomic Software's Autonomic Network & System Administration (ANSA) products offer a range of endpoint management capabilities, including patch management, asset management, software deployment, configuration management, government/corporate conformance and policy monitoring, software audit/compliance, and power conservation management.

Autonomic Software's ANSA Platinum Power Management plug-in is integrated with McAfee ePO, providing McAfee ePO users with a comprehensive solution to manage desktop and laptop power usage. With this, enterprises can significantly cut energy costs, reduce global carbon emissions, and increase their networks' "green" footprint. McAfee ePO users have the benefit of applying power policies through a familiar interface and know that they are enforced.

McAfee Compatible solution:
Autonomic Software ANSA Platinum 5.0 and McAfee ePO 4.5.

Avecto

Avecto is a leader in Windows privilege management, helping organizations to deploy secure and compliant desktops, laptops, and servers. Avecto’s mission is to enable customers to lower operating costs and improve system security through the removal of user admin rights. By removing admin rights with Avecto’s award winning Privilege Guard technology, organizations empower all Windows-based users with the permissions they require to perform their roles, without compromising the integrity and security of their systems. Customers with up to 400,000 end users have chosen Avecto Privilege Guard to help them strengthen security across their Windows-based environments.

The integration of Avecto’s Privilege Guard with the McAfee ePolicy Orchestrator (McAfee ePO) platform delivers near real-time monitoring of all privileged activity across McAfee ePO-managed assets, accelerating the roll out of least-privilege desktops through integrated agent and policy deployment. Rich, contextual dashboards and reports provide granular risk and compliance data to enable users to quickly identify and address privileged access requirements. Combining Avecto Privilege Guard with McAfee ePO software gives users increased productivity, simplifies Windows 7 migrations, and delivers comprehensive privilege management across the enterprise. Read the solution brief for more details.

McAfee Compatible solution:
Avecto Privilege Guard 3.5 and McAfee ePO 4.6.

Avencis

Avencis is a leading independent European vendor specializing in strong authentication and credentials management, providing field-proven solutions to hundreds of customers worldwide. In addition to its own technology, Avencis leverages its strategic technological partnerships to provide security solutions to enterprises and organizations ranging from 1,000 to 150,000 users. Thousands of users use Avencis products and solutions daily to securely and seamlessly access their working environment.

SSOX, Avencis' E-SSO product, together with McAfee’s Endpoint Encryption for PCs, will provide strong authentication, access control, and single sign-on to any application and resource, throughout the enterprise. The joint solution secures access to information, from the initial system boot to the applications themselves, smoothly and seamlessly, bringing tremendous benefits both in terms of information security, convenience, and cost-effectiveness.

McAfee Compatible solution:
Avencis SSOX and McAfee Endpoint Encryption V6.0 on Windows 2003, 2008, XP, VISTA.

AVOB

AVOB — Alternative Vision Of Business — is a leading provider of power management and green IT solutions. Established in 15 countries, AVOB offers businesses EnergySaver, its flagship enterprise solution, which reduces networked PCs energy consumption and carbon footprint by up to 75%.

AVOB Energy Saver 5 is fully integrated in the McAfee ePolicy Orchestrator (ePO) platform. Installation and deployment are seamless, directly managed through the ePO console and can take only a few minutes. An intuitive graphical user interface simplifies the setting of your energy policies and schedules to match the needs of users across your network, without impacting productivity. AVOB’s reliable and secure wake technology allows PCs to emerge from sleep modes for a nightly update and to go back to sleep before waking up in the morning prior to use. AVOB and McAfee customers can save from $20 to $65 per PC each year with a rapid ROI within months. Read the solution brief for more details.

McAfee Compatible solution:
AVOB Energy Saver 5 for McAfee ePO 4.5 and 4.6.

Blackridge Technology

Founded in 2008, BlackRidge Technology, the Identity Aware Network company, provides innovative Identity-based cyber security solutions protecting web-based cloud, mobile and data center infrastructures against sophisticated security threats. Built upon patented Transport Access Control (TAC) technology, BlackRidge Eclipse prevents attackers from performing reconnaissance of high-value and mission-critical network assets by denying them the ability to communicate anonymously.

By integrating BlackRidge Eclipse into the McAfee ePO platform customers will gain the ability to manage Identities and their associated policies through a unified view.

Boldon James

For over 20 years Boldon James software has helped organisations with the most demanding communication requirements to manage sensitive information securely and in compliance with legislation and standards. Boldon James extends the capabilities of Microsoft core infrastructure products to allow secure information exchange. In particular, the Boldon James Classifier products provide users with a means to classify and protectively mark emails, documents and files from within familiar office productivity tools - improving data loss prevention measures and reducing archiving costs. Boldon James is a wholly-owned subsidiary of QinetiQ, with offices in the US, Europe, and Australia, and channel partners worldwide.

Boldon James Classifier engages users in the process of classifying information at the desktop by making it a simple part of their day-to-day activity – capturing the valuable insight of data owners, improving their awareness of information handling responsibilities and more closely involving them in preventing data loss. Boldon James Classifier integrates with McAfee Data Loss Prevention (DLP) to boost the effectiveness of data loss prevention by ensuring that information is augmented with meaningful metadata which in turn allows for reliable, consistent DLP actions to be applied.

McAfee Compatible solution
Boldon James Classifier and McAfee DLP Network 9.2

BowBridge

BowBridge Software is a leading provider of content security solutions for mission-critical SAP applications. The AntiVirus Bridge products secure file transfers and data feeds into SAP applications and protect them from malware and other content-based threats, such as cross-site scripting and active content. BowBridge content security products have been certified multiple times by SAP and it has a wealth of experience in securing the most complex SAP implementations.

With BowBridge’s latest generation of solutions, customers worldwide benefit from the integration of McAfee virus scan technology into AntiVirus Bridge for SAP solutions. The combination delivers high performance and maximum protection in the most demanding enviroments. AntiVirus Bridge will feed content security related events directly into McAfee ePolicy Orchestrator (McAfee ePO). This will allow customers to monitor and report on their SAP infrastructure without having to access the SAP system, resulting in a more streamlined and consolidated security view.

BP Informatica

BP Informatica is an innovator of real-time security intelligence and control solutions. Its flagship product, Kataskopeo, understands network protocols and digital content. By analyzing network behavior and application domain, Kataskopeo manages content for compliance of business policy and regulations. With the KWeb and KDB/KDB2 module, it also provides end to end application monitoring though the ZOs IT environment, helping IT organizations and businesses improve performance and security compliance.

BP Informatica has integrated the KatasKopeo software suite with McAfee Vulnerability Manager for Databases to enhance visibility and deliver compliance through integrated audit reports.

McAfee Compatible solution:
Kataskopeo KDB v 2.0 and McAfee Database Activity Monitoring v4.2 and/or v4.3.

BreakingPoint

BreakingPoint Actionable Security Intelligence™ protects enterprises, service providers, and government agencies by providing global visibility into emerging threats and actionable insight to harden and maintain resilient defenses. With the exclusive ability to capture and control global threat intelligence at Internet-scale, BreakingPoint delivers a product capable of battle-testing IT infrastructures, training cyber warriors, tuning systems and policies, and transforming security processes to be proactive and effective.

BreakingPoint bridges the gap between IT testing, monitoring, and operations and will pursue integration with McAfee solutions to deliver the advance insight needed to harden highly dynamic converged and mobile networks, virtualized data centers, and applications.

Brinqa

Brinqa provides solutions to enterprises and public agencies for governance, risk management, and compliance (GRC), enabling the continuous improvement of operational and regulatory effectiveness. Brinqa's offering is based on its forward-thinking vision of a centralized, fully automated, and reusable GRC platform combined with targeted applications to meet program-specific GRC needs. Brinqa GRC solutions provide process efficiencies, increased data/controls quality, and cost savings to assess the maturity of current programs, define and manage improved processes, measure ROI and risk, and review metrics and trends.

The integration of Brinqa Risk Manager with the McAfee ePolicy Orchestrator (ePO) platform and McAfee Vulnerability Manager delivers a comprehensive solution for managing application risk scores for critical applications. McAfee vulnerability data is factored into the Brinqa risk scoring models and subsequently reflected within all risk scorecards and metrics. The consolidation of data-sources within a central risk management platform delivers a thorough, global, and accurate view of application risk, enabling fully-informed decision making processes across the enterprise.

McAfee Compatible solution:
Brinqa GRC Platform 3.5, Brinqa Risk Manager 3.5, and McAfee Vulnerability Manager 6.5.

Bromium

Bromium is a pioneer in the use of hardware virtualization to deliver dependable, secure and manageable computing infrastructure. The founders of Bromium are leaders of the Xen® hypervisor team, and have dedicated their careers to advancing the state of the art in systems architecture, security, and performance. The Bromium team consists of a group of highly-motivated individuals who are black-belts in virtualization, security, and systems software.

Bromium’s patented technology adopts an entirely new, powerful yet extraordinarily simple approach to the use of hardware virtualization, with a single goal in mind: The delivery of highly trustworthy computing infrastructure that is a joy to use and affordable to own and manage. Bromium’s first product, vSentry, complements the endpoint protection capabilities offered by McAfee. Bromium will integrate vSentry with McAfee ePO, utilizing extremely granular and dynamic hardware virtualization to offer enhanced protection where existing black- and white-listing capabilities are challenged.

Ceedo

Ceedo Technologies delivers workspace virtualization solutions that extend the reach of business computing to unmanaged PCs. Ceedo allows enterprises to deploy their business applications to a portable virtual workspace that works instantly on any Windows PC, enabling them to provision teleworkers, temps, contractors, and partners without the need to manage additional desktops or increase their data center capacity. Ceedo’s products have been deployed on over four million devices worldwide, where they are managed and used daily by consumers, enterprises, and service providers.

Ceedo’s integration with McAfee Encrypted USB drives constitutes a fully functional, low-TCO laptop alternative that customers can use to provision application environments quickly, improving business continuity during PC failures and natural disasters, and allowing users to work anytime, anywhere. McAfee’s encrypted drives encapsulate Ceedo’s workspace with biometric user authentication and strong AES 256-bit hardware encryption, and Ceedo’s management system works alongside McAfee ePO to allow both private and public partitions to be provisioned and managed. Read the solution brief for more details.

McAfee Compatible solution:
Ceedo Enterprise 3.5.0.6 and McAfee Encrypted USB.

Charismathics

Charismathics is a global leader in identity management software. Its premier product, the Charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, Charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPMs) and the first PKI client to support pre-boot environments. Charismathics offers security products and PKI consulting in a variety of industries, including banking and finance, healthcare, telecommunications, security, government, and PC manufacturing.

Charismathics enables the McAfee Endpoint Encryption client’s broad use of the smart card security chip operating system through integration with CSSI, even into existing PKI-2FA infrastructures. This partnership helps build awareness surrounding pre-boot authentication, and delivers an enhanced, unified security approach to a wide range of enterprise clients and individual users.

McAfee Compatible solution:
McAfee Endpoint Encryption 5.x and Charismathics Smart Security Interface software and Charismathics Plug-n-Crypt USB device.

Circadence

Since its founding in 1993, Circadence® has pioneered smarter, faster, and more cost-effective solutions for improving IT performance. What started with an innovative platform for making massively multiplayer online games run faster has quickly grown into one of the most capable suite of optimization solutions available. Circadence’s proprietary optimization protocol drives its solutions, enabling the Circadence MVO™ 1200 WAN Optimization suite of solutions. Deploying Circadence MVO solutions – as hardware or software – extends the capabilities of existing network infrastructures, dramatically improves data transport speed, and ensures uptime of critical point-to-point Internet communications during any situation.

Circadence has partnered with McAfee and will integrate the MVO 1200 WAN Optimization suite with the McAfee ePO platform. Through this integration, customers will benefit from increased visibility and control of MVO from the ePO dashboard, allowing them to manage Circadence solutions using fewer resources while keeping administration costs low, all resulting in increased productivity.

McAfee Compatible solution:
Circadence MVO 1200 WAN Optimization suite and McAfee ePO 4.6.

Co3 Systems

Co3 Systems automates incident response (IR) to make it efficient, compliant, and best of breed. Co3 instantly generates detailed incident-specific response plans and provides collaboration functions to ensure a consistent, repeatable outcome. By automating IR based on IR best practices, industry frameworks, contractual needs, and compliance requirements, Co3 ensures effectiveness, accuracy, and compliance — while reducing expense and risk.

Co3 plans to build an integration with McAfee Enterprise Security Manager (ESM). This integration will enable McAfee ESM correlation rules to drive automatic initialization of incidents within Co3, prepopulating the incident with details provided by ESM, generating a contextual IR plan, and automatically assigning IR teams.

Confident Technologies

Confident Technologies, Inc. (CTI) provides image-based, multifactor authentication solutions that are highly secure and easy to use. The company’s unique, image-based approach generates one-time passwords (OTPs) and delivers an entirely out-of-band multifactor authentication solution for strong user authentication that is simple to deploy, easy to use, and cost effective. Users authenticate by simply identifying a few pictures that fit their previously-chosen, secret authentication categories. Built with responsive design, Confident Technologies’ image-based authentication solutions are ideally suited for use on mobile devices, allowing users to authenticate with just a few quick taps on the touchscreen. CTI’s image-based, multifactor authentication solutions provide strong user authentication, one-time passwords and out-of-band authentication for secure access to online accounts, web services, applications and other environments.

CTI’s image-based authentication and verification solutions have been fully integrated with the McAfee Enterprise Security Manager (ESM), McAfee’s Security Information and Event Management (SIEM) platform. CTI’s technologies are used to capture IP addresses and other data of users accessing enterprise systems or online accounts, and feed that data to McAfee ESM for analysis and risk management. With this integration, CTI solutions are able to provide progressive authentication based upon risk factors and security level, as well as to provide McAfee ESM with data that can be used to identify and block malicious IP addresses, brute force attacks and other web-born security threats. Image-based authentication solutions for web, mobile and multifactor authentication can be inserted as a layer of authentication anywhere in the enterprise that will gain benefit from the additional threat intelligence fed into McAfee ESM.

McAfee Compatible solution
McAfee ESM 9.1.3 is integrated with Confident Image Shield 2.31

Core Security

Core Security is a leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented and proven enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company’s innovative security research center.

Core Insight leverages vulnerability scans from McAfee MVM and also plans to enrich the value of McAfee ePO platform by providing predictive security intelligence capabilities. By enabling multi-vector threat simulation and live attack execution, ePO users will have the ability to see high-priority risks and prioritize remediation tasks against validated network, application and end user vulnerabilities. As a result, McAfee customers will obtain valuable intelligence regarding their organization’s real-time security posture, while connecting real risks to specific operational and business goals.

McAfee Compatible solution
Core insight 2.6 and McAfee Vulnerability Manager 7.5; CORE Insight Enterprise 2.8 with McAfee ePO 4.6

Courion

Courion offers a comprehensive identity and access management solution that equips you with visual real-time identity and access information. Quickly and confidently provide open and compliant access to applications and data, recognize and reduce risk as it occurs, streamline compliance activity, and expedite audits.

Courion will integrate identity-related information with McAfee ePO to link users, access policies, and sensitive data throughout the enterprise. This will help answer questions such as: Where is sensitive data? Who has access to it? What kind of access and controls are in place for different users and resources? The joint solution will help bridge the knowledge gap between user identity and access policies in heterogeneous customer environments.

CryptoTech

CryptoTech provides hardware-based signature and authentication solutions with a strong commitment to ease of use, flexibility, and security on crypto smart cards and USB tokens. As optimal personal sensitive data protection and storage devices, hardware tokens are widely integrated with CryptoTech’s own or third-party software solutions dealing with PKI-based model of information security.

CryptoTech is committed to open standards and plans to provide a security solution that combines the strengths of McAfee Endpoint Encryption with the protection of secret keys offered by their smart card product line CryptoCard multiSIGN family.

Cyber-Ark

Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

Cyber-Ark’s PIM Suite integration for McAfee ePO provides near real-time alerts and a view of Privileged User activity and accountability for critical IT assets, including servers, databases, networking components & applications across the datacenter, which is particularly useful for highly regulated firms, service providers and government agencies. Read the solution brief for more details.

Cyber-Ark’s Application Identity Manager (AIM) integration for McAfee Vulnerability Manager (MVM) provides a fully automated, ultrasecure and auditable run-time vulnerability scanning authentication capability. The integration provides enhanced information security for MVM’s privileged access credentials by storing them within Enterprise Password Vault (EPV) and optionally changing the credentials after every use, without operator intervention or knowledge.

McAfee Compatible solution:
Cyber-Ark PIM Suite 6.0 & 7.0 and McAfee ePO 4.5 & 4.6; Cyber-Ark Application Identity Manager, EPV, and McAfee Vulnerability Manager 7 & 7.5.

Cybertap

Cybertap delivers powerful and human-oriented tools to investigators of net-based activity. Cybertap supports ’Insider Threat’ investigations, eDiscovery, eFOIA, lawful intercept of network traffic, many intelligence uses, cybersecurity, and net-based crime damage assessments. Current generation tools provide a net-oriented view of activity consisting of IP addresses, traffic type, and some basic content inspection, but human-oriented activity doesn’t operate on these elements. Cybertap Recon operates on and reassembles captured network traffic back to its original form: PDF documents, web pages, MySpace, Chat sessions, photos, VoIP sessions, etc. and then indexes everything, to include attribute data, metadata, and IP addresses. Recon then provides investigators with powerful tools to search, visualize, make associations among, and export relevant data sets in support of information security, loss (intellectual property, money, and sensitive materials) prevention, Human Resources actions, Legal filings, and State and Local law enforcement crimes investigations. Cybertap makes the lowest level data relevant to the highest level investigators.

Cybertap Recon will integrate with the McAfee ePO platform to provide an alerting mechanism for the triggering of human-oriented network activity investigations employing the Recon tools. This joint solution will result in the quickest reaction to anomalous events and most thorough investigation of their substance and impact.

Cylance

Cylance, Inc., a global provider of cybersecurity products and services, is changing the way companies, governments and end users proactively solve the world’s most difficult security problems. Through a holistic security process called Presponse™, Cylance couples the understanding of a hacker’s mentality with algorithmic intelligence and technology to be truly predictive and preventive against advanced threats. Powered by a global user community and an elite team of security experts, Cylance is solving large and complex problems simply and elegantly. Cylance's integration with McAfee ePO makes smart solutions smarter. Focused on advanced threat intelligence for incident response, forensics, and IT departments, this combination of security provides the most efficient and effective contextual information to classify the unknown as either safe or a threat.

Cyvera

Cyvera is an innovative provider of cyberdefense solutions, protecting organizations from sophisticated, targeted cyberattacks that strive to gain access to sensitive data assets or destruct the operational infrastructure. With Cyvera's products, organizations can block the most up-to-date computer attacks, even when the attacks utilize novel methods, known only to the perpetrators — from zero-day malware and highly obfuscated exploits to any other form of attack that aims to evade existing security solutions. Cyvera's products are based on a new concept of cyberattack prevention. Instead of trying to monitor, sample, or analyze actions to identify the attack — and only then to contain it — Cyvera first obstructs the attack flow, and only following the successful prevention, extracts information and valuable intelligence on the attack.

When Cyvera is integrated with McAfee ePolicy Orchestrator (McAfee ePO), the solution provides an additional significant layer of security. Organizations can deploy Cyvera's solution with no additional agent installed or separated distribution and management systems. Cyvera TRAPS, together with McAfee security, can provide your organization with the most comprehensive solution against targeted attacks.

DearBytes

DearBytes helps organizations gain and maintain control over the security of critical assets and information. As a security service provider, DearBytes has extraordinary insights into the daily, real-world challenges companies face controlling security. The solution-driven attitude of DearBytes led to the development of various tailor-made solutions such as Dear360 (security risk management using McAfee technology), Bytescan, and its highly valued managed services program.

Bytescan is DearBytes’ advanced second-opinion antimalware solution, powered by HitmanPro. After the integration of Bytescan into McAfee ePolicy Orchestrator (McAfee ePO), organizations will be able to easily implement a multivendor approach to secure their endpoints, managed from one security console. Detected malware by Bytescan will be immediately available for analysis by McAfee Labs, which will allow for faster detection and removal of malicious software using McAfee VirusScan Enterprise.

Def-Logix

Def-Logix, Inc. is an emerging leader in the provision of Information Assurance, Software Engineering, and Information Technology services to the Defense, Intelligence and Commercial communities. Our mission is to provide innovative technological expertise and solutions to our customers. We offer specialized services in computer and network security and state-of-the-art technology solutions to serve the critical needs of our government and commercial customers. Def-Logix sets itself apart by the caliber of its work and a strong culture of innovation.

Deployable Enhanced Forensics (DEF) - End Node Detector (END) includes cutting edge tools for performing computer/network forensics in the Enterprise. It automatically correlates boundary network events to host systems, and then automatically collects forensic information from effected devices. This information is analyzed by a server to determine if the system has been compromised. DEF-END will be integrated with ePO, with incidents reported back to ePO dashboards where appropriate action can be taken by system administrators or incident responders.

DG Technology

DG Technology Consulting provides IT solutions to maximize clients’ IT investments. The company’s solutions are backed by the most talented technologists and best-of-breed products and services from the top IT companies in the world. Technology changes constantly, yet customers must keep up with those changes to ensure the business is secured, managed, and supported 24/7. DG Technology believes and has proven that the foundation for success in this type of environment is through strong partnerships with companies and individuals. While no one entity can be everything for every company, a network of partners can help ensure success.

DG Technology has integrated its Mainframe Event Acquisition System (MEAS) with McAfee ePolicy Orchestrator (ePO) software. IT organizations have multiple platforms to secure, manage, and support. MEAS collects information pertaining to security events, database events, and transaction processing events. This integration helps customers to ensure policy-based security compliance of mainframe events, and view mainframe security events on ePO dashboards.

McAfee Compatible solution
Mainframe Event Acquisition System (MEAS) v 4.0 and McAfee ePO 4.5 and 4.6.

Endgame Systems

Endgame systems provides real-time analytics, data visualization, cutting edge vulnerability research and knowledge discovery capabilities that support security in cyberspace by revolutionizing the detection and mitigation of cyber threats. Endgame’s solutions meet the most demanding national cyber-security challenges of the US government's defense and intelligence organizations as well as those of large commercial customers.

Endgame helps customers leverage internal and external knowledge sources to dynamically defend their network enclaves from cyber threats. Endgame plans to integrate with McAfee ePO to provide a command and control overlay across endpoint devices, giving enterprise security teams the ability to dynamically defend their networks from a centralized situational awareness and cyber security platform.

Evidian

Evidian, an affiliate of Bull Group, is one of the major worldwide vendors of identity and access management (IAM) software. Evidian’s solutions include IAM Suite, Enterprise Single Sign-On (SSO), and network and system management. Evidian’s software helps more than 700 organizations worldwide improve agility, enhance security, and comply with laws and regulations, while reducing costs.

Together, Evidian Enterprise SSO and McAfee Endpoint Encryption for PCs provide single sign-on authentication to applications and other environments, complementing and extending the data protection capabilities of McAfee Endpoint Encryption. The combined solution secures information access at the point of initial system boot, eliminating multiple passwords and thwarting possible pre-boot attacks. Read the solution brief for more details.

McAfee Compatible solutions:
Evidian Enterprise SSO version 8.0 and McAfee Endpoint Encryption version 5.2.

Evolven

Evolven redefines change and configuration management with its groundbreaking Change and Configuration Monitoring and Analytics. Evolven’s software-as-a-service and on-premise solutions enable companies to dramatically increase the stability and safety of their IT environments, reduce the risk of production issues, cut environment incident investigation time and effort, and lower operating costs.

Evolven is working to integrate its change and configuration analytics solution with McAfee ePO. The joint solution will allow customers in IT operations to know exactly what has changed in their environments by collecting, analyzing, and auditing detailed configuration data.

Fasoo

Fasoo has built a worldwide reputation as an enterprise digital rights management (EDRM) solution provider with industry-leading solutions and services. Fasoo EDRM allows organizations to prevent unintended information disclosure or exposure, ensuring a secure information-sharing environment, to better manage workflows and simplify secure collaborations both internally and externally. Fasoo has successfully retained its leadership in the EDRM market by deploying enterprise-wide solutions for more than 1,100 organizations, securing more than 2 million users. Fasoo is seeing continuous improvement in its global market position, based on its unique technology, ongoing R&D, and strategic approach to comprehensive product capabilities. Fasoo is also planning for future expansion through new business models, including database security (Solidbase), static code analysis (Sparrow), and content platform solutions.

DLP and EDRM are typically thought of as separate solutions that could replace each other; however, security requirements of organizations generally require both DLP and EDRM. DLP’s ability to scan, detect data, and enforce appropriate actions using contextual awareness helps in reducing the risk of losing sensitive data through exfiltration. When sensitive data has been legitimately sent to authorized users outside the organization, EDRM protects the data from subsequent transfers to unauthorized users. Fasoo EDRM integrated with McAfee DLP forms an essential solution to protect sensitive data, both within and outside of the organization. Considering most data leaks originate from insiders who have or had authorized access to sensitive documents, organizations must enhance existing security infrastructures with data-centric security solutions to persistently protect data in use. This integrated solution enables organizations to allow DLP to scan DRM-protected documents and apply DLP policies; enforce DLP policy engines to encrypt (reclassify) as DRM-protected documents; and secure data persistently to reduce the risk of losing sensitive data from both insiders and outsiders.

Fidelis Security Systems

Fidelis Security Systems produces network-connected products that enable organizations to discover, investigate, and contain advanced threats by providing deep visibility and control over network content, channels, and locations throughout all phases of the threat life cycle — from initial infiltration through command and control communication, lateral propagation, and data exfiltration. The Fidelis XPS products include a broad spectrum of technologies and dynamic threat intelligence that identify threats by decoding and analyzing network traffic in real time, and record or block suspicious or malicious network sessions.

The Fidelis XPS CommandPost management system will integrate with McAfee ePolicy Orchestrator (McAfee ePO) software, giving ePO administrators a high level of visibility over network threats identified by the Fidelis XPS sensors.

FireMon

FireMon, formerly Secure Passage, provides enterprise security management software that gives companies deeper visibility and tighter control over their network security infrastructure. A leading provider of firewall policy, risk, and compliance management solutions, FireMon’s flagship product, Security Manager, simplifies and automates the analysis of configuration and change management processes to enhance security, optimize performance, and speed compliance reporting. Security Manager analyzes changes and performs audits in real time, simplifies policy management, and enforces configuration governance across firewalls, switches, routers, and other network devices. Security Manager is the only solution on the market that can be customized to meet the unique audit and compliance reporting requirements for networks of all sizes, while enabling IT organizations to do more with less effort. Enterprise-strength deployments of Security Manager around the world support more than 40,000 active security devices.

FireMon Security Manager helps keep McAfee Firewall Enterprise running smoothly with a complete configuration management solution. Wizard-based discovery monitors device configurations and verifies their current state, usage, and connections. FireMon Security Manager also monitors the complete McAfee Firewall Enterprise infrastructure, where it checks for user editing events and captures a full audit trail of operations. Enforcement points are monitored for policy installations and inefficiencies, as well as usage.

McAfee Compatible solution:
FireMon Security Manager 6.0 with McAfee Firewall Enterprise v8.

fixIQ

fixIQ® is a comprehensive IT asset management solution with a centralized and intuitive web-based interface. fixIQ is an all-in-one solution that enables thorough and effective management of IT assets throughout the organization from a single interface, including compliance, license management, policy enforcement, and patches. Based on real-time tracking technology, all data collected is stored in a centralized database that sets the foundation for an array of powerful analysis features.

fixIQ is integrated with the McAfee ePolicy Orchestrator (ePO) platform, providing improved visibility and more complete management of assets on a network. The combined network information from both products empowers administrators to make more effective policy enforcement decisions.

McAfee Compatible solution:
fixIQ 9.31 and McAfee ePO 4.6

Fixmo

Fixmo is the mobile risk management (MRM) company that enables protected and compliant mobile computing in the workplace. Fixmo’s products help enterprises and government agencies secure and manage their mobile devices, protect their corporate data, maintain system integrity, and prove regulatory compliance. Fixmo’s Enterprise Mobility Platform (Fixmo EMP) technology has been developed as part of a Cooperative Research and Development Agreement (CRADA) with the U.S. National Security Agency (NSA) and is deployed within government agencies and enterprise customers around the world.

McAfee and Fixmo are working closely together to integrate McAfee ePolicy Orchestrator (McAfee ePO) and Fixmo’s Enterprise Mobility Platform. The integration will give administrators the power to view mobile-related information and statistics collected through Fixmo EMP from within the McAfee ePO console, as well as enact mobile management commands from within the console that would be executed by Fixmo EMP. As a mobile security innovator, Fixmo is eager to provide tight integration with McAfee ePO, the industry standard in advanced security management.

ForeScout

ForeScout is a provider of clientless network access control and policy enforcement that does not require installing a client on endpoints, such as laptops, desktops, VoIP phones, PDAs, printers, and other devices. ForeScout’s CounterACT appliance provides a range of enforcement options when policy violations are detected.

ForeScout has partnered with McAfee to deliver a unique and powerful solution for continuous monitoring and mitigation of enterprise risk. CounterACT is a network appliance (or virtual appliance) which installs out-of-band, therefore adding no latency or potential for failure to the network. Through advanced integration modules, ForeScout CounterACT shares information with McAfee ePO and McAfee ESM, and both McAfee ePO and McAfee ESM can trigger ForeScout CounterACT to perform network actions such as to quarantine a device. Read the solution brief for more details.

McAfee Compatible solution:
ForeScout CounterACT 6.3.4 with McAfee ePO 4.5 and 4.6 and McAfee Enterprise Security Manager 9.0 and 9.1.

Fox Technologies

Fox Technologies (FoxT) provides an access management solution suite that enforces privileged user access policies for servers and end user access policies to applications through a single, non-intrusive platform, across Windows, Unix and Linux servers, in conjunction with existing IDM systems and Directories. Powerful controls over privileged users and accounts, as well as automatic provisioning and de-provisioning of user access rights greatly reduces the risk of a security breach. In addition, the FoxT solutions automatically consolidate the detailed user activity logs from across disparate systems and produces specific audit and compliance reports.

The integration of FoxT solutions with McAfee ePO enables the management of authentication and authorization policies for both users with elevated privileges and traditional users to servers and applications, using the McAfee ePO console for both solution deployment and reporting. Read the solution brief for more details.

McAfee Compatible solution
FoxT ServerControl 6.6.2 for RedHat Linux, Solaris, and Windows with McAfee ePO 4.6.

Gemalto

Gemalto is a leader in digital security and delivers solutions that meet the growing, worldwide demand for mobile connectivity, identity and data protection, credit card safety, health and transportation services, e-government, and national security. Gemalto supplies governments, wireless operators, banks, and enterprises with a wide range of secure personal devices, such as SIM cards in mobile phones, smart banking cards, smart card access badges, electronic passports, and USB tokens for online identity protection. To complete the solution, Gemalto also provides software, systems, and services to help customers achieve their goals.

Gemalto’s security products, such as .NET cards and Smart Enterprise Guardian (SEG), are interoperable with McAfee Endpoint Encryption, enabling the highest levels of security to protect company assets, data, and brands. Read the solution brief for more details.

McAfee Compatible solutions:
McAfee Endpoint Encryption 6.1 and the following Gemalto Smart Cards: .NET, CyberFlex Access 64K, Classic TPC IM, and LuxTrust GemP15-1.

Glasswall

Glasswall Solutions is an emerging technology and innovation leader delivering information security, compliance and assurance through its patented Glasswall software library. Glasswall provides the capability to manage and secure the content of file-based business-critical and normally communicated data such as PDF, MS Office and image formats, the most commonly used vectors for Advanced Persistent Threats (APTs). Glasswall does not use signatures and as such is ‘update free’ with no window of vulnerability, and provides a unique level of protection from file based threats. Glasswall’s small footprint makes it highly portable across all multi-layered security architectures and ideal for mobile platforms which have little memory and virtually no scalable security offering.

By integrating Glasswall into McAfee ePO and on targeted endpoint and gateway security solutions, Glasswall will enhance McAfee’s capability to provide incident intelligence and file based security, particularly on the most vulnerable file types which are being used to deploy APT’s.

Guidance Software

Guidance Software is a leader in digital investigations. The EnCase platform enables corporations and government agencies to conduct thorough, network-enabled, and court-validated digital investigations. More than 100 of the Fortune 500 and over half of the Fortune 50 use EnCase solutions, including Allstate, Chevron, Ford, General Electric, Honeywell, Mattel, Northrop Grumman, Pfizer, UnitedHealth Group, and Viacom.

With the release of EnCase v6.14, Guidance customers can take advantage of the McAfee ePolicy Orchestrator (ePO) deployment and reporting functionality. This allows joint customers to conduct digital investigations on assets managed by McAfee ePO. Read the solution brief for more details.

Guidance EnCase v6.19 is also interoperable with McAfee EEPC v6.x. This functionality allows mutual customers to decrypt the drive before forensic inspection.

McAfee Compatible solution
Guidance EnCase 7.5 and McAfee ePO 4.5 and 4.6; Guidance EnCase 6.19 and McAfee EEPC v6.x

Guident

Guident is a leading integrator of business intelligence, management consulting, and systems engineering services for government agencies. Guident assists its clients in tightly managing project scope, budget, resources, and risks to ensure success. Leveraging its proven business intelligence methodology, Guident developed the Virtualization Control and Optimization Portal (VCOP), a risk management solution that provides government agencies situational awareness, decision support, auditing, troubleshooting, and reporting of their IT security and compliance posture. VCOP collates, transforms, and aggregates data from disparate sources across the IT ecosystem to generate browser-accessible graphical dashboards of Key Performance Indicators (KPIs). VCOP increases organizational risk awareness, improves the accuracy and timeliness of FISMA reporting, and reduces annual costs associated with addressing security and mandatory compliance requirements.

Guident will integrate McAfee products into VCOP to enable the automated collection, testing, and enforcement of security controls throughout the enterprise for both physical and virtual environments. This operational intelligence provides monitoring and management of business activities with near real-time situational awareness and analysis of the agency’s performance.

HBGary

HBGary specializes in developing advanced computer analysis products to detect, diagnose, and respond to advanced malware, targeted threats, and other cybercrime activities. HBGary’s flagship product, Digital DNA, delivers unparalleled detection coupled with post-exploitation forensics to provide dynamic analysis of malware.

Through this partnership, Digital DNA is now integrated with the McAfee ePolicy Orchestrator (ePO) platform, so that McAfee customers can deploy Digital DNA, scan physical memory for malicious and unauthorized code, and report results to the McAfee ePO console for optimal corrective action. Read the solution brief for more details.

McAfee Compatible solution:
HBGary Active Defense 2.0.0 with McAfee ePO 4.5 and 4.6.

Hewlett Packard

HP, the world’s largest technology company, simplifies the technology experience for consumers and businesses with a portfolio that spans printing, personal computing, software, services, and IT infrastructure. HP’s Secure Advantage solutions provide an integrated approach to securing this portfolio, allowing customers to more easily protect resources and data.

By combining HP technologies and services with McAfee as part of the SIA program, enterprises gain end-to-end solutions that better address critical security challenges, improve risk management, and ease the path to compliance. Read the solution brief for more details.

McAfee Compatible solution (End of Life):
ArcSight ESM 4.0 and McAfee ePO 4.5.

HID Global

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognized for robust quality, innovative designs, and industry leadership, HID Global supplies OEMs, system integrators, and application developers in a variety of markets, including physical and logical access control, card personalization, e-government, cashless payment, and industry and logistics. HID Global is headquartered in Irvine, CA, and has over 1,700 employees worldwide.

HID Crescendo Contact Card C700, a highly secure multi-technology smart card with out-of-the-box, standards-compliant support for existing physical and logical access control applications, is now integrated with McAfee Endpoint Encryption. Most HID Global’s smart card readers are also integrated with McAfee Endpoint Encryption, providing joint customers with a more complete secure identity solution.

McAfee Compatible solutions:
McAfee Endpoint Encryption v5 and AET SafeSign Identity Client with HID Crescendo Contact Card C700; McAfee Endpoint Encryption v6 and HID OMNIKEY (1021 USB, 3021 USB, 3121 USB, 3621 PinPad USB, 3821 PinPad USB, 3921 USB, 5121 USB (contact interface only), 5125 USB Prox (contact interface only), 5321 USB (contact interface only), 5325 USB Prox (contact interface only), 6121 Mobile USB, 6321 USB (contact interface only), 4040).

Hitachi Global Storage Technologies

Hitachi ID Systems, Inc. is a leading provider of identity and access management solutions. Hitachi ID software helps almost 1000 organizations with over 12 million combined users meet security, internal control, regulatory compliance, IT cost reduction and user service objectives. The Hitachi ID Management Suite includes Identity Manager, Password Manager and Privileged Access Manager. These products manage identities, entitlements, and authentication factors across both on-premise and SaaS applications in the cloud.

Hitachi ID Password Manager is integrated with McAfee Endpoint Encryption and enables users who forgot their PC activation password to securely authenticate themselves on a phone call to an IVR system, by answering security questions or providing a biometric voice print sample. Once authenticated, users can access an unlock code for their PC and get back to work. All this is done via self-service, eliminating calls to the help desk and reducing IT support cost.

Hitachi Global Storage Technologies offers a complete portfolio of storage products and services for consumers and business users. The company’s advanced hard disk drives and solid state drives are designed for use in a broad range of market segments and applications, including notebook and desktop computers, consumer electronics devices, and enterprise servers and storage arrays. Hitachi’s G-Technology and SimpleTech product lines deliver innovative external storage for consumers, small businesses, and creative professionals. As part of the SIA program, Hitachi Global Storage Technologies will work with McAfee to integrate its "TCG Opal" standard compliant encrypting hard drives with McAfee Endpoint Encryption.

McAfee Compatible solution:
Hitachi ID Password Manager 7.x with McAfee Endpoint Encryption 5.x.

HyTrust

HyTrust®, headquartered in Mountain View, CA, is a leader in policy management and access control delivering automated controls and visibility that allow its customers to scale their cloud infrastructure, virtualize even g Tier 1 applications, achieve compliance, and enable multi-tenancy.

HyTrust has developed an integrated solution with McAfee ePO to provide rich event reporting and policy enforcement for virtual infrastructure, including trusted cloud computing with Intel Trusted Execution Technology (TXT). Read the solution brief for more details.

McAfee Compatible solution
HyTrust Appliance v3.0 McAfee ePolicy Orchestrator 4.6

Icon Labs

Icon Labs is an RTOS-focused Security Company. Icon Labs’ Floodgate™ Defender is one of the EDN Hot 100 products of 2011. The Floodgate product family (Floodgate Defender, Floodgate Agent, and Floodgate Aware) provides protection, security management, and situational awareness for RTOS or legacy endpoint devices. You can apply this product to individual endpoints or in groups to create a secure enclave of protected devices.

The Floodgate product family extends the capabilities of McAfee ePO to legacy embedded devices, giving network administrators visibility and management of devices that are otherwise not visible to security management systems. You can implement the Floodgate product family as a bump-in-the-wire solution for legacy devices such as unmanaged SCADA or RTOS-based systems, or integrated into new device designs. Floodgate provides system administrators the ability to view device status and manage, distribute, and enforce packet filtering policies from their central ePO management console.

IdentityX

IdentityX Inc.(a Daon affiliate) is an identity assurance company. Daon develops technology that empowers organizations and people to interact with trust, ease and confidence. IdentityX is a new, highly innovative, game-changing identity assurance technology that leverages latest generation smart devices (e.g. iPhone, iPad, Android, Windows Phone 7 and Blackberry) to enable risk-aware authentication and validation of a user’s identity. It can be embedded in smart-device apps or can be a separate (out-of-band) authentication mechanism to traditional systems.

IdentityX Authenticator will integrate with McAfee ePO and other McAfee products to securely authenticate individuals for transactions of consequence and to support data security by verifying the identity of the user. Working together, IdentityX and McAfee will authenticate identity to a high level of fidelity. The solution will work with all leading mobile and desktop devices providing customers with a flexible, scalable way to meet their needs for identity assurance for all types of digital interactions.

Imation

Imation Mobile Security provides solutions that address the demands of the mobile workforce, for enterprise and government organizations, that are easy to use, easy to deploy and easy to manage, while also providing a broad set of security options able to meet varying customer requirements. Organizations want to capture the benefits of the mobile environment for employees, partners and customers. This demands both the protection of sensitive information and strong regulatory compliance, while maintaining the flexibility and ease of use that mobility promises.

Imation Stealth ZONE instantly transforms any computer into a standard IT-managed system while maintaining both performance and security. Stealth ZONE leverages the Imation USB product line, which is compatible with McAfee Endpoint Encryption and is managed by McAfee ePO, to deliver a superior secure USB desktop. Read the solution brief for more details.

McAfee Compatible solution:
Imation's Series of USB devices (1, 2, 4, 8, 16, 32 and 64 GB) are currently compatible for pre-boot authentication with McAfee Endpoint Encryption v5.

Imprivata

Imprivata is a leading independent vendor focused on simplifying and securing user access. By strengthening user authentication, streamlining application access, and simplifying compliance reporting across multiple computing environments, customers can align security with user workflows and realize substantial productivity gains, while lowering IT costs. Headquartered in Lexington, MA, Imprivata partners with over 200 resellers, and serves the access security needs of more than 1,000 customers around the world.

Imprivata OneSign Authentication Management, Single Sign-On, and Secure Walk-Away products have been tested for compatibility with McAfee’s Endpoint Encryption for PCs (EEPC) product. Starting from the initial system boot, the joint solutions provide secure,seamless access and single sign-on to applications and other network resources, and protect unattended workstations from unauthorized access.

McAfee Compatible solution:
Imprivata OneSign 4.5 Authentication Management, Single Sign-On, and Secure Walk-Away with McAfee Endpoint Encryption v6 and Windows XP.

InfoReliance

InfoReliance is an industry leader providing cyber security, software engineering, cloud computing and IT support to the US Federal government. As an innovator in IT services for the federal sector, InfoReliance has developed, designed, deployed and secured solutions that transform the business operations of clients across the globe. After spending more than a decade securing systems and networks across distributed and highly targeted enterprises, InfoReliance developed the CloudHASH Security Suite to address real-world gaps in available technology – gaps that attackers exploit every day.

CloudHASH Security is a suite of modules that will integrate with McAfee ePO to simplify enterprise desktop firewall configuration, enhance malware detection, and add desktop banner management. Host Firewall Orchestrator is a desktop firewall management module that will streamline firewall configuration with McAfee’s Host Intrusion Prevention System. The Host Security Sentinel module will allow security engineers to build advanced custom signatures, including historical analysis through the ePO console to quickly investigate malware on all hosts in an enterprise. The Dynamic Desktop Banner module presents is a customizable, color-coded banner across the top of every user’s computer screen and will be centrally controlled through the ePO console. These modules will complement existing ePO implementations to create a richer endpoint protection solution.

McAfee Compatible solution:
InfoReliance CloudHASH Dynamic Desktop Banner (DDB) 1.0.32 and ePO 4.5 and 4.6.

Intel

Intel application security and identity solutions consist of identity-driven software and appliances that are now sold as McAfee-branded solutions. Among these, the McAfee Services Gateway secures SOA, REST, or Cloud Web Services for cross-domain, B2B, and EAI. Another solution, McAfee Identity Manager, delivers SSO, provisioning, and second-factor authentication for user-to-cloud access with connectors for Google Apps, Salesforce.com, Taleo, and SharePoint.

The McAfee Cloud Security Platform includes a set of Intel modules that provide security for all cloud traffic (email, web, and identity authentication) between the enterprise and the cloud. The web service security module is powered by McAfee Services Gateway while the identity and access management module is powered by McAfee Identity Manager. Learn more about the McAfee-Intel combined solution.

McAfee Services Gateway also integrates with the McAfee ePolicy Orchestrator (ePO) platform for security event monitoring across a single node or cluster of gateways. The administrator can use ePO software to provide visibility into critical security events such as XML content threats, authentication failures, suspicious behavior, and potential denial of service threats in a single, consolidated dashboard. The integration provides visibility into past security events, as well as recent changes to the security posture of the device to reflect protective action taken by the gateway.

McAfee Compatible solution:
McAfee Identity Manager and McAfee Cloud Security Platform; McAfee Services Gateway R2.8 and McAfee ePO 4.5 and 4.6.

Internet Identity

IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands, and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks, and ISPs leverage IID to detect and mitigate threats.

By integrating IID’s Resolver and Signals solutions into McAfee ePolicy Orchestrator (ePO), there's no more digging through mountains of data to determine if an enterprise is at risk. The joint IID-McAfee solution enables organizations to get real-time alerts about the latest Internet threats and compromised machines living on their network, all in one place. With this centralization and consolidation of resources, organizations can save valuable time while protecting mission- and business-critical data and communications. By doing so, organizations can concentrate more on their core business. Read the solution brief for more details.

McAfee Compatible Solution:
IID Resolver and Signals with McAfee ePO 4.6.

Invincea

Invincea is a premier innovator in secure virtualization of desktop applications, protecting enterprise networks from Internet-based threats, such as spear phishing. The company’s solutions offer a unique ability to protect networks against all types of threats directed at end users — including zero-day threats — by seamlessly moving applications that render untrusted content into controlled, secure virtual environments that automatically detect and terminate threats in real time. Invincea seamlessly moves the browser, PDF reader, complete Office Suite, .zip and .exe file types from the native operating system into fully virtualized and secure environments, harnessing desktop resources without changing the user experience or requiring additional network bandwidth or footprint.

Invincea's integration with McAfee ePO enables joint customers to automatically import Invincea Threat Data generated at the desktop point-of-attack into McAfee ePO dashboards. This information provides an extensive forensic footprint of the attempted breach – providing unparalleled visibility into the methods, targets and frequency of attacks. This data is available in real-time to administrators to gather electronic intelligence to support broader incident response, discovery, and corporate investigations. Read the solution brief for more details.

McAfee Compatible solution:
Invincea Threat Data Server v1 and v2, and McAfee ePO 4.5 and 4.6.

iScan Online

iScan Online is a pioneering security firm that enables scanning from the cloud to any device — anytime, anywhere. Remote workers, mobile devices, branch offices, and the “bring your own device (BYOD)” trend create a gap in vulnerability, compliance, and security scanning. iScan Online closes this gap by providing visibility to every device no matter where it is and when it accesses a network or applications. iScan Online can perform traditional vulnerability scans, compliance scans (PCI, HIPAA), and data discovery scans (PAN, PII). Delivered via the cloud and performed on the device, iScan Online can scan thousands of devices simultaneously.

Mutual customers will be able to initiate scans by iScan Online using the McAfee ePolicy Orchestrator (McAfee ePO) console, and the results will be integrated into McAfee Enterprise Security Manager, McAfee’s SIEM solution. This will provide McAfee customers more visibility into their vulnerability, compliance, and risk posture.

Key Tronic Corp.

Key Tronic Corporation is a leading manufacturer of PC keyboards with over 30 years of experience in the keyboard market, delivering quality, reliability, and performance.

Key Tronic’s smartcard keyboard with embedded CCID-compliant SC reader offers the security of a smartcard reader integrated into the keyboard. Working with the application software, the smartcard reader keyboard offers a two-pronged approach to securing data on a computer system. No extra desk space is needed for the keyboard and the smartcard reader is able to handle over 50,000 card insertions.

McAfee Compatible solution:
Key Tronic SCARD-U1 keyboard with embedded CCID compliant SC reader and McAfee Endpoint Encryption v5.

Lieberman Software

Lieberman Software provides a broad range of powerful security management and reporting tools for Microsoft Windows IT administrators that help accomplish weeks of tedious administrative work in minutes. The company also provides cross-platform privileged identity management solutions that are used by large government organizations, commercial enterprises, and cloud infrastructure providers. Lieberman Software’s solutions are known for their rapid deployment; low initial and ongoing TCO; ability to scale and handle complex, dynamic environments; and achievement of comprehensive regulatory compliance in a matter of weeks.

Lieberman Software will integrate its privileged identity management solution with McAfee ePolicy Orchestrator (ePO) software by passing alerts generated from privileged account password activity to ePO dashboards. This will help answer questions such as:

  • Who has been accessing which sensitive accounts for what purpose?
  • When were privileged account passwords last changed?
  • What kinds of access controls are in place for privileged resources?
The joint solution will prove compliance with governance, risk, and compliance (GRC) mandates like HIPAA, SOX, and PCI DSS through integrated audit reports. Lieberman Software will also use McAfee ePO to deploy its suite of tools for IT administrators and provide reporting and remediation of security configurations for Microsoft Windows workstations and servers. Read the solution brief for more details.

McAfee Compatible solution:
Lieberman Enterprise Random Password Manager 4.8.3 and McAfee ePO 4.6.

LockPath

LockPath helps companies of all sizes address the increasingly complex issues of regulatory compliance and risk management. Its innovative software provides keen insight by correlating security information from multiple data sources with current regulations and policies to gauge risk. Easy to install and manage, Lockpath’s Keylight platform empowers people at every level in an organization to take control and make better business decisions.

The integration of the Keylight platform with McAfee Vulnerability Manager solution provides mutual customers with greater risk intelligence to tackle their risk and compliance challenges. McAfee Vulnerability Manager’s vulnerability scan data, integrated into the Keylight platform, automatically correlates it to a customer’s assets. Users can utilize Keylight’s advanced reporting capabilities to contextualize vulnerabilities from a business perspective. Managers across the organization have access to a dashboard that provides them with a deeper understanding of the organization’s security and risk posture. Keylight also plans to integrate with McAfee ePO. Read the solution brief for more details.

McAfee Compatible Solution
Keylight 3.0 and McAfee Vulnerability Manager 7.5

LRW Technologies

LRW's Pinecone solution is a secure data platform that encrypts and transports data between an enterprises' backend and a secure, "sandboxed" application on mobile devices. Pinecone is more than just messaging software that offers encrypted e-mail, calendar, and contacts for smart phones and tablets. In addition, it provides secure access to Office, FileShare, and a secure browser, all inside the container. Pinecone secures data at rest and data in transit using AES 256-bit encryption and enables organizations to access legacy systems or develop "in-house" applications utilizing the secure Pinecone data transport. Pinecone is the perfect choice for organizations to secure and manage corporate data and secure custom applications on both corporate issued and BYOD devices.

Pinecone was developed for organizations that are concerned with security, ownership of data, and reliability. Pinecone provides organizations with a solution that is owned and operated completely inside of the enterprise network. Unlike most other solutions on the market today which require data to travel through a third party Network Operating System (NOC), Pinecone utilizes relay servers in the DMZ and inside of the enterprise infrastructure. LRW plans to integrate Pinecone with McAfee ePO, allowing the administrator to access and monitor the relay servers both internally and in the DMZ through a "single pane of glass". The integration will also provide live accessibility to the admin of attacks on the relay or intrusion to the network via the Pinecone architecture.

LuxTrust S.A.

LuxTrust S.A. was founded in November 2005 by the government of Luxembourg and several key players from the private sector to create a digital certification platform using a public key infrastructure (PKI). LuxTrust provides an authentication solution for individuals to access applications online or on an internal network. To guarantee the safety of this authentication, LuxTrust uses strict identification procedures and a national network of registration authorities which are specifically qualified to perform such a task.

LuxTrust offers products (smart cards, signing sticks, Signing Server certificates, SSL and Object certificates) and services (trusted-time stamping and tailor-made PKI solutions) that guarantee secure correspondence. It responds to financial services’ needs for improved security, guaranteed confidentiality, integrity, and proof of documents that are exchanged. All products and services comply with internationally-recognized standards.

McAfee Compatible solution:
McAfee Endpoint Encryption 5.x and LuxTrust Smartcards and Signing Sticks.

MITRE

The MITRE Corporation is a not-for-profit organization chartered to work in the public interest. As a national resource, MITRE applies its expertise in systems engineering, information technology, operational concepts, and enterprise modernization to address its sponsors' critical needs. MITRE plans to integrate its technology with McAfee ePO.

Mocana

Mocana, a leader in mobile app, Android, and iOS security, provides a device-independent security platform that secures mobile and smart connected devices, as well as the apps and services that run on them. The Mocana Mobile App Protection™ (MAP) product enables new layers of security to be wrapped into mobile apps, without having to write any code, and without impacting performance, battery life, or app usability.

Integrating MAP API's for Data at Rest (DAR) with McAfee ePolicy Orchestrator (McAfee ePO) will enable government and enterprise customers to make policy changes on a granular basis to their enterprise apps. By leveraging McAfee ePO with MAP, customers will be able to add Mocana's FIPS 140-2 compatible DAR encryption, per app VPN, secure copy/paste, and other features to their enterprise apps for a more secure mobile device environment.

Monet+

MONET+ is a major central European player in the payment solutions industry. MONET+ ranks among the leading suppliers of smart card-based systems on the Czech and Slovak IT markets, providing comprehensive, sophisticated solutions that meet strict compliance and security standards. MONET+ focuses on secure transaction systems and related products, such as secure communication and client authentication. MONET+ solutions are used by companies in the banking sector, large supermarket chains, private companies, and state administration offices. Thousands of users use MONET+ products and solutions daily to securely access their working and user environment.

MONET+ will integrate ProID+, its two-factor authentication product, with McAfee Endpoint Encryption. ProID+ enables secure access to systems via microchip-embedded cards. ProID+ provides strong authentication for end users and single sign-on to any application throughout the enterprise, and delivers implementation of Public Key Infrastructure (PKI) to customer's IT systems. Using the CryptoPlus architecture, which supports a wide range of applications within organizations, ProID+ customers can easily build secure information systems.

Net Optics

Net Optics is a leading global provider of intelligent access and monitoring architecture solutions that deliver real-time IT visibility, monitoring, and control, helping customers achieve peak performance in network analytics, compliance, and security. For 15 years, Net Optics served customers across the financial, telco, healthcare, and government sectors. Today's capabilities span virtualization, 10G, and 4G/LTE, enabling uncompromising security, regulatory compliance, and network monitoring, all while streamlining management and controlling costs. Solutions include the revolutionary Phantom Virtual Tap™; Director xStream Pro™; Indigo Pro; and appTap™. Net Optics has worked with McAfee to ensure that its network Taps are interoperable with the McAfee Network Security Platform. Read the solution brief for more details.

McAfee Compatible solution:
McAfee Network Security Platform and the following Net Optics taps: RG-830 (Regen, 8x1 Inline Fiber, 1G), RG-840x (Regen, 8x1 Inline Fiber, 10G,SR), RGN-GCU-IL8 (Regen,8x1,IL,Copper,1G), TP-50SR5-LCSLM (Slim Tap,LC, Fiber, 10G 50um), TP-LR5-LCSLM (Slim Tap,LC, Fiber, 10G 8.5um)

NetClean

NetClean is a world leader in technical solutions for preventing the spread of child sexual abuse content. The products are developed in cooperation with police authorities, and NetClean's proactive solutions are employed by millions of users. NetClean's client portfolio includes, among others, small to multinational companies as well as government agencies, internet providers and police authorities.

The company has integrated its NetClean ProActive platform with the McAfee ePO software, allowing customers to prevent child sexual abuse content from being accessed or shared via a corporate network. Customers can now deploy the NetClean ProActive software quickly and easily to McAfee-managed endpoints, as well as track the number of endpoints protected by NetClean ProActive.

McAfee Compatible solution:
NetClean ProActive 12.1 and McAfee ePO 4.5 and 4.6.

NetFort

NetFort provides software products to monitor activity on virtual and physical networks. Its LANGuardian software provides an extremely robust depth of insight into network activity. LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet. Unlike other packet capture products, LANGuardian does not require dedicated hardware -- it is a software-only solution that runs on industry-standard hardware and virtualized environments. And, because it gathers information from network traffic, no client software is required and there is no impact on network performance. NetFort was established in 2002 and has its headquarters in Galway, Ireland.

LANGuardian will integrate with McAfee ePO by forwarding event information collected through deep packet inspection of network traffic. This data will provide ePO administrators additional insights into network activity, enabling them to drill down from top-level reports to individual network links, client devices, users, file shares, files, websites, and downloads. Reports will include bandwidth usage, web traffic, web access via proxy servers, and activity on Windows file shares. Read the solution brief for more details.

Niksun

NIKSUN deploys world-class drill down forensics to allow users to Know the Unknown®. The threat of cyber attack is real. Traditional approaches are not enough for today’s cybersecurity risks, and new tools and solutions are often necessary to provide adequate protection. NIKSUN has developed a patented state-of-the-art technology to simultaneously capture, inspect, mine, correlate and store everything traversing the network at multi-gigabit rates.

The NIKSUN NetDetector® & NetDetectorLive® cybersecurity appliances complement the McAfee Network Security Platform (NSP). NIKSUN appliances provide increased network visibility by capturing and storing all packet data providing the ability to analyze, inspect, and correlate all data traversing the network at multi-gigabit rates. The joint McAfee NSP and NIKSUN integrated solution will provide a best-of-breed approach for cyber intrusion, prevention, and advanced network forensic capabilities. The integration will permit immediate drill down to packet level information for granular forensic analysis through the McAfee NSP console. This capability, combined with Niksun’s super fast search and actionable intelligence and the McAfee NSP platform, will rapidly identify vulnerabilities such as zero-day threats and Advanced Persistent Threats (APTs), so that appropriate mitigation steps can be quickly taken.

Norse

Norse delivers live, actionable threat intelligence that enables organizations to proactively defend against today’s most advanced attack vectors including zero day and advanced persistent threats. Norse’s global threat intelligence platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high risk Internet traffic – dark intelligence - to identify the sources of cyber attacks and fraud. Norse’s global infrastructure sees attacks as they occur and enables organizations to proactively and automatically stop attacks in progress.

Norse live threat intelligence is the perfect complement to McAfee Global Threat Intelligence. Norse gathers intelligence from 'behind enemy lines', collecting and analyzing dark intelligence from the source - where bad actors operate. The McAfee Compatible integration of Norse with McAfee NTR-CADS provides customers with the most comprehensive information on attack vectors available in the market today.

nPulse

nPulse Technologies is the performance leader in packet capture and connection/session analysis. The flagship product, CPX, delivers cost-effective, indexed packet capture at speeds up to 20Gbps. Leading companies in the Financial Services, Federal Government, and Telecommunications sectors rely on CPX for protection of network and security operations. Through its innovative Pivot2Pcap API, CPX significantly enhances existing monitoring and security solutions.

nPulse's partnership with McAfee Enterprise Security Manager allows network security operations personnel to quickly pivot from security alerts in ESM to the packets and session-level decodes for the event. Allowing users to quickly locate and decode an entire session provides greater visibility into potential malicious activities and payloads, while also eliminating the time required to manually collate all of the packets within a session. Users can expand searches to view network activities before and after a security event, further enhancing visibility for incident response and forensics activities.

Oberthur Technologies

Oberthur Technologies is a world leader in the field of secure technologies, with more than $1 billion in annual revenue. Innovation and high-quality services ensure Oberthur Technologies’ strong position in its main target markets of smart cards, secure identity documents, fiduciary printing, and cash protection.

Oberthur Technologies’ range of dual-interface smart cards is designed to meet the security requirements of today’s card issuers. Intelligent, portable, and standardized smart cards verify the identity of individuals rapidly and reliably, while respecting their privacy. Oberthur Technologies is very well-positioned to help governments and institutions deploy intelligent identification and security systems.

McAfee Compatible solution:
McAfee Endpoint Encryption 6.1 and the following Oberthur Smart Cards: ID-One Cosmo V7, ID-One v5.2, ID-One v5.2 Dual, CS PIV (2048 bit) and Cosmopol IC 64K v5.2 Fast ATR.

Onapsis

Onapsis is a leading provider of solutions to protect ERP systems from cyber-attacks. Through unmatched security, compliance and continuous monitoring products for SAP and Oracle ERP applications, Onapsis secures the business-critical infrastructure of its global customers against espionage, sabotage and financial fraud threats. Company's products include Onapsis X1, the first SAP-certified solution to provide automated SAP security assessments, and Onapsis IPS, the most advanced SAP vulnerability signatures for Intrusion Detection and Intrusion Prevention systems.

Onapsis plans to extend the capabilities of McAfee Network Security Platform (NSP) through the unique knowledge-base captured in Onapsis products, enabling customers to enjoy unprecedented visibility and protection against cyber-attacks on their ERP systems. After this integration, customers will be able to effectively decrease the severe risks affecting their most critical business information and processes.

Overtis

Overtis is a leading provider of user activity monitoring solutions. VigilancePro from Overtis assists organizations in complying with a wide range of standards, legislation, and regulations by enabling the monitoring of all user activity across all devices and applications, in and out of the cloud. Overtis provides an irrefutable audit trail of who did what, where, and when, through patented integration with physical security systems. Specific user actions, linked to defined content as well as contexts, such as time and location, result in real-time alerts to key personnel, facilitating rapid and appropriate response to compliance and policy breaches. VigilancePro provides a user-centric view that is complementary to NAC, IAM, DLP, and SIM/SEM solutions.

VigilancePro will integrate with the McAfee ePolicy Orchestrator (ePO) platform and send event information and actionable alerts based on user activity to ePO dashboards. The joint solution will allow customers to accurately correlate network events with specific user actions, including full visibility of details such as the application in use, as well as the menu option, button, or keystrokes that gave rise to a particular event. Presenting the complete enterprise security picture in a single view through the McAfee ePO platform will improve compliance while reducing risk, complexity, and cost.

PIOLINK

PIOLINK, a leader in application delivery networking, web security, and layer 2/3 switching technology, has made significant contributions to the development of Korean IT infrastructure.

TiFRONT security switch from PIOLINK provides secure L2 switching, blocking anomalous traffic such as TCP Syn flooding and UDP and ARP flooding from PCs. It also prevents unauthenticated hosts and ARP spoofing in a UC environment. As part of the McAfee Security Innovation Alliance, PIOLINK will integrate TiFRONT with McAfee ePolicy Orchestrator (McAfee ePO) and send security events to McAfee ePO dashboards.

Prevari

Prevari provides industry-leading solutions that objectively and quantitatively measure, model, and manage technology risk. Prevari Technology Risk Manager (TRM) enables organizations to lower the cost and complexity of IT risk management by providing quantitative, actuarial-based metrics. TRM also enables modeling and simulation, providing organizations with the ability to determine the impact of risk mitigation activities before investing in technology, process, and compliance initiatives.

McAfee Vulnerability Manager and McAfee Policy Auditor provide organizations with automated methods to quickly and accurately identify technical vulnerability exposures, and to audit configuration policy compliance. Using data created by these McAfee solutions, Prevari TRM provides a common language for managing technology risk across the enterprise, aligning technology, compliance, and risk management goals with specific business objectives. Read the solution brief for more details.

McAfee Compatible solution:
Prevari Technology Risk Manager 4.0 and McAfee Vulnerability Manager 5.0–6.0, as well as McAfee Policy Auditor 5.0–6.0.

Q1 Labs

Q1 Labs is a global provider of high-value, cost-effective network security management products. The growing company’s flagship offering, QRadar, integrates previously disparate functions, including log management, network behavior analytics, and security event management into a total security intelligence solution. QRadar provides users with crucial visibility into what is occurring within their networks, data centers, and applications to better protect IT assets and meet regulatory requirements.

QRadar security information and event management (SIEM) now integrates with the McAfee ePolicy Orchestrator (ePO) platform. By combining ePO’s asset-based system security information with QRadar’s ability to monitor user, application, data center, and network-based security information, customers gain end-to-end visibility and can leverage the inherent operational efficiencies of the high-value, cost-effective QRadar network security management family. Read the solution brief for more information.

McAfee Compatible solution (End of Life):
QRadar 6.1.3 and McAfee ePO 4.0.

Quest Software

Now more than ever, organizations need to work smart and improve efficiency. Quest Software, Inc. creates and supports smart systems management products — helping customers solve everyday IT challenges easier and faster. Quest products and people are dedicated to helping customers manage their critical Microsoft Windows infrastructure, applications, databases, and virtual environments.

Quest Software offers auditing solutions for Active Directory to proactively track, audit, report, and alert on vital configuration changes — in real-time and without the overhead of native auditing. Customers instantly know who made what change, when, and where, as well as the previous and current settings. This level of detailed auditing is important to IT administrators and directors who centrally manage security for IT systems and need to provide an audit trail to show compliance with external regulations. For McAfee customers, the ePolicy Orchestrator (ePO) platform is central to managing security for these systems, networks, data, and compliance. Together, Quest and McAfee will offer a comprehensive solution for auditing changes to Active Directory systems.

Raytheon

Raytheon Company, with 2010 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security, cybersecurity and other government markets throughout the world. Raytheon SureView enables safe and effective use of mission-critical technologies by capturing human behaviors that serve as warning signs leading up to a breach. SureView replays the event in a DVR-like format providing irrefutable and unambiguous attribution of end-user activity. While offering full context for rapidly discerning malicious from benign actions that are easily reviewed and understood by non-technical personnel—all while respecting employee privacy guidelines. SureView goes beyond DLP to proactive information protection.

Raytheon SureView integrates with the McAfee ePO platform enabling operators to deploy and monitor the health and status of SureView agents, perform version upgrades and remove agents. Read the solution brief for more details.

McAfee Compatible solution:
Raytheon SureView 6.5 and McAfee ePO 4.5.

Raz-Lee

Raz-Lee Security is a leading international provider of security, auditing, and compliance (SOX, PCI, HIPAA, etc.) solutions for the IBM i. Raz-Lee’s customers include companies of all sizes, from SMBs to enterprises in all vertical markets and industries. Raz-Lee’s iSecurity suite of products includes both infrastructure security solutions that protect network access, monitor and report on system activities, manage user profiles and authorities, and track software changes, as well as application security solutions which audit database activity, provide real-time alerts when critical business data changes, enable business intelligence analysis of application data changes, and much more. iSecurity has full multi-LPAR management capabilities and works in both green-screen and full GUI modes.

iSecurity’s integration with McAfee Database Activity Monitoring (DAM) will entail collection and transfer of DB2 activity originating on the IBM i. The McAfee sensor running on an external Linux machine will receive events from iSecurity, evaluate each event, and communicate with the DAM server to apply policy rules and report on the events. As such, iSecurity will enable multiplatform users of McAfee DAM to incorporate database and security-related information originating from IBM i systems, resulting in increased security visibility and faster time to problem resolution.

McAfee Compatible solution:
Raz-Lee Firewall 16, Raz-Lee Audit 12, and McAfee Database Activity Monitor 4.4.3.

RedSeal Systems

RedSeal Networks develops security posture management software that enables organizations to assess and strengthen their cyber defenses. Unlike systems that detect attacks once they occur, RedSeal identifies holes in the security infrastructure that could be exploited — before they are discovered by hackers. RedSeal software analyzes and simplifies the complex interaction of firewalls, routers, load balancers, and hosts, delivering in-depth understanding of overall security posture; continuous compliance with regulations such as PCI, FISMA, and SOX; and actionable steps for risk remediation.

RedSeal Vulnerability Advisor analyzes vulnerabilities discovered by McAfee Vulnerability Manager in the context of network security controls. It identifies which vulnerabilities are exposed to untrustworthy networks and which could be used to launch attacks deeper into the network. It prioritizes vulnerabilities for action based on risk, identifies network mitigation options, and reports on portions of the network that require additional scanning. Read the solution brief for more details.

McAfee Compatible solution:
RedSeal Vulnerability Advisor 6.5 with McAfee Vulnerability Manager 7.5, McAfee Firewall Enterprise 8, McAfee Enterprise Security Manager 9.2, and McAfee ePO 4.6.

Reflex Systems

Reflex Systems' Virtualization Management Center (VMC) is innovative in its approach to integrate monitoring, performance analytics, capacity planning, configuration management, and security into a single solution, providing real-time visibility, correlation, and control across your entire virtual or private cloud environment. IT organizations are able to manage the virtual enterprise based on existing organizational business processes and leverage virtualization to do things that were simply not possible in the physical data center. This translates to comprehensive management and enforcement, better utilization of the shared computing resources, and automation of data center operations across all virtual resources, whether in the corporate data center or a private cloud.

McAfee and Reflex developed a joint solution based on the industry-leading McAfee Network Security Platform and award-winning Reflex Virtualization Management Center. The solution extends integrated, knowledge-based network and system security uniformly across virtual and physical environments. Reflex VMC forwards virtual network traffic to the Network Security Platform inspection engine. Suspicious interactions are flagged for administrative action, which are executed in the virtual environment through the Reflex VMC using our vTrust technology with stateful virtual firewall capabilities. Read the solution brief for more details.

McAfee Compatible solution:
Reflex Virtual Management Center 2.15 and McAfee Network Security Platform 6.1.

routeworks

RouteWorks' main focus is to simplify business needs in the field of technology, valuing customer satisfaction. Service offering includes offshore product development, integration, and quality assurance targeted toward small and mid-sized technology organizations. All of the service engagements use industry best practices; including a software development life cycle adopted by software professionals. The service lines are easy to understand, scalable, and flexible enough to meet RouteWorks’ growing client demands.

RouteWorks has partnered with McAfee to deliver a unique set of integration services helping other SIA partners in developing workable interoperable solutions. RouteWorks’ vast expertise in McAfee ePO development will help SIA partners bring their integration solutions to market at a faster pace.

RSA

RSA, the Security Division of EMC, is the premier provider of security, risk, and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption and key management, SIEM, data loss prevention, and fraud protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.

RSA will integrate its RSA® enVision SIEM solution with McAfee ePO to enhance both the real-time detection and automated response to attacks. RSA enVision will send alerts generated from correlated events to McAfee ePO dashboards, including security threats, compliance violations, and policy breaches. McAfee ePO users will be able to respond with targeted countermeasures, audit, and remediation functions provided by McAfee security solutions.

SafeNet

SafeNet is one of the largest data security companies in the world, and is trusted to provide data protection solutions to market-leading organizations around the globe. SafeNet data protection solutions ensure high-value information is secure throughout its lifecycle, providing data security from the data center to the cloud.

Multifactor authentication serves a vital function within any organization — securing access to corporate networks, protecting the identities of users, and ensuring that users are who they claim to be. The recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control, such as SaaS applications and mobile device management, represents a shift in how trust and control is established and maintained. SafeNet’s SafeWord authentication products will feature seamless integration with McAfee Firewall Enterprise, a high-assurance firewall that offers strong next-generation capabilities, including application visibility and deep application controls for defense. SafeWord also integrates with Active Directory and VPN platforms, and delivers a choice of one-time password (OTP) authenticators, supporting authentication and SSO for cloud applications.

Sagem Orga

Sagem Orga is a pioneer and global leader in the smart-card industry. The company develops and implements cutting-edge technology to turn the vision of unbounded mobile communications and integrated digital security into a reality.

Security, logical access, and identity management are strategic issues for all enterprises. Protecting access to IT systems and corporate data is more than a necessity. Sagem Orga will work with McAfee to combine McAfee Endpoint Encryption with its smart cards and, optionally, with its biometric terminals. Sagem Orga will leverage its expertise in key technologies to provide enterprises with a solution that prevents data loss, using powerful encryption and strong access control.

SandForce

SandForce is transforming data storage by pioneering the use of standard flash memory in enterprise, client, and industrial computing applications with its innovative Solid State Drive (SSD) processors. By delivering unprecedented reliability, performance, and energy efficiency, SSDs based on patent-pending SandForce DuraClass technology unleash the full potential for mass-market adoption of SSDs using NAND flash memory. Founded in 2006, SandForce is funded by leading venture-capital investors and first-tier storage companies.

SandForce will collaborate with McAfee to develop SSD solutions that leverage TCG security standards. Through its integration with McAfee Endpoint Encryption, SandForce will provide a seamless user experience for the security-minded market.

secureauth

SecureAuth for SSO is an integrated strong authentication platform that provides transparent, secure single sign-on (SSO) for on-premise web applications, off-premise cloud applications, and traditional VPN resources, all from a single appliance. Used in conjunction with McAfeeEndpoint Encryption, enterprise IT customers benefit from true end-to-end security while giving end users a familiar experience that does not impact productivity. SecureAuth leverages a user’s domain authentication from a McAfee encrypted workstation and then performs an identity translation to local, on-premise, and cloud-based resources. SecureAuth exceeds the requirements of compliance regulations such as PCI DSS, HIPAA, and FFIEC. Read the solution brief for more details.

McAfee Compatible solution:
SecureAuth for SSO v5.0 and McAfee Endpoint Encryption V6.0 (on Windows XP, VISTA, 2003 and 2008).

Securonix

Securonix provides a leading information risk intelligence platform for security and compliance professionals. The platform consumes identity, access, and activity information from any source and then uses behavior, access, and identity risk analytics to continuously identify the highest risk users, resources, and activity in the environment for proactive management. At the enterprise application level, such as SAP and Oracle, Securonix goes deeper to automatically and continuously identify and fingerprint sensitive data for data loss protection while monitoring high-risk activity and access.

McAfee DLP, ePO, and NitroSecurity customers can use Securonix to extend their visibility, monitoring, and critical data protection into key enterprise applications while enriching their security management with advanced identity, access, behavior analysis, and dynamic policies. This integrated McAfee-Securonix solution extends valuable coverage to an enterprise’s critical applications while focusing the output down to an actionable set through analytics. Read the solution brief for more details.

McAfee Compatible solution:
Securonix Identity Intelligence 3.1, Securonix Threat & Risk Intelligence 3.1, Securonix Application Intelligence 3.1 and McAfee Data Loss Prevention 9

Skybox Security

Skybox Security, a leading provider of proactive security risk management solutions for global enterprises, provides automated, non-intrusive tools that detect, prioritize, and drive remediation of critical risks such as exposed vulnerabilities and firewall configuration errors.

The integration of Skybox Risk Control with McAfee Vulnerability Manager enables organizations to identify, prioritize, and rapidly remediate the most critical 1-2 percent of risks detected by McAfee Vulnerability Manager. Skybox simplifies the remediation process by calculating all possible attack vectors; finding the 1-2 percent of vulnerabilities that can be exploited; and proposing the most effective way to block them – whether it be by enabling specific IPS signatures, tuning firewall or router security configurations, or by patching intermediate systems. Skybox’s solution for network security management, which includes Skybox Firewall Assurance, Skybox Network Assurance and Skybox Change Manager, integrates with McAfee Firewall Enterprise to automate enterprise-wide security policy compliance with industry and corporate best practices. Skybox Change Manager streamlines the security change management process to ensure that all changes are evaluated for risk and compliance with corporate policies before being applied to ensure the integrity of your network’s perimeter. Read the solution brief for more details about Skybox and McAfee Vulnerability Manager. Read the solution brief for more details about Skybox and McAfee Firewall Enterprise.

McAfee Compatible solution:
Skybox Firewall Assurance 6.5 and Skybox Change Manager 6.5 with McAfee Firewall Enterprise 8; Skybox Risk Control 6.5 with McAfee Vulnerability Manager 7.5

Softex

Softex, founded in 1992, in Austin, Texas, is a leading provider of security software products and solutions. Softex is an established market leader with innovative products in Enterprise Single Sign On (ESSO), Identity and Access Management (IAM), and Data Protection (Self Encrypting Drives) Solutions. SecureDisable — a security solution powered by Intel® Anti-Theft Technology (Intel AT) that can lock-down lost or stolen Intel processor-based notebooks — is the most recent addition to its security products portfolio. SecureDisable can be securely hosted in the cloud by Softex or hosted by customers and solution providers using enterprise software.

After the integration is complete, customers will be able to use the Softex SecureDisable plug-in for McAfee ePolicy Orchestrator (McAfee ePO) software to deploy the client software/agent on ePO-managed assets and view reports from these assets into ePO dashboards. IT Administrators/Helpdesk can report and recover a lost or stolen machine using the existing workflows of the ePO management console.

Solera Networks

Solera Networks is a pioneer in delivering Network Security Analytics — a high-speed network monitoring and forensics platform for complete network capture, classification, indexing, visualization, and reconstruction of any network event. Solera DS Appliances record, classify, and index every packet, flow, and attribute at line rates up to 10 Gbps, on physical and virtual networks. Solera Networks appliances integrate into existing security workflows and support best-of-breed security tool environments, giving security professionals comprehensive network visibility.

The Solera Networks integration with McAfee Network Security Platform through McAfee Network Security Manager provides an efficient workflow for network event investigation and analysis. By leveraging Solera Networks APIs, security analysts or incident responders have content "look-back" capabilities for a full view of historical network events, enabling forensically complete incident investigation. Users can pivot data from event parameters in Network Security Manager — such as time, port, source, and destination IP addresses — directly into Solera DS Forensics Appliances for complete context and packet-level evidence surrounding any event. Read the solution brief for more details.

McAfee Compatible solution:
Solera DS Appliances (DS 5200, DS 3200, and DS 1200) and McAfee Network Security Platform Appliances (M8000, M6050, M4050, M3050, and M2750).

SPP

SPP is a value-added technology solution provider based in Vienna, Austria. SPP was founded in July 1987 to distribute standard software products to the Austrian Market and to serve as the local representation for key software manufacturing vendors while delivering high customer satisfaction. Working with major enterprise accounts over the past 10 years, SPP has developed a security tool called DAT-QA. Many large McAfee customers use this tool to comply with their internal requirements.

SPP´s DAT-QA plug-in for McAfee ePO is complementary to McAfee’s AV solution, and is designed for McAfee customers to fully automate their internal QA-process for DAT-files. In addition to McAfee’s comprehensive QA, DAT-QA enables customers to incorporate the specifics of their own IT-environment. New McAfee DAT updates and ExtraDats are run against representative customer client systems to further improve the odds of successful DAT updates. The combination of McAfee QA and the individualized customer QA-process improves the stability and security of customer IT infrastructure.

Spyrus

The Spyrus high-assurance Rosetta Series II smart cards and USB security devices, and the Hydra Privacy Card (PC) Series II data security family enhance the security of McAfee Endpoint Encryption by providing secure pre-boot two-factor authentication and private key storage. The Hydra PC family uniquely provides a suite of security products encompassing encrypted data storage, secure data sharing with cryptographically authorized recipients, zero footprint computing, and data loss containment.

SyferLock Technology

SyferLock Technology develops authentication solutions that address, fix, and leverage the user’s existing password through patented methodology and solutions. SyferLock allows the use of an existing password, but keys and transmits it as a true, one-time password, without requiring additional hardware, tokens, or client-side software. This is a very secure and flexible self-service that is a low-cost alternative for one-time password generation, compared to deploying costly and cumbersome hardware solutions. SyferLock has three key defining features. First, it addresses and fixes the broken first factor or static password. Second, it allows an alternative to generating one-time passwords without relying on tokens, smart cards, or other hardware, creating a drastic reduction in authentication TCO. Third, it adapts to user and organizational security threats through a self-service layering approach to multi-factor authentication.

SyferLock plans to integrate its authentication solutions with McAfee Endpoint Encryption.

Sypris

Sypris is a world-class, integrated systems solutions and cyber security provider with over 45 years of global experience. Sypris develops encryption products, Defensive Network Architecture (DNA), advanced cyber security services and electronic manufacturing capabilities that are aligned to provide its customers the best people, processes and technologies to continually exceed expectations. Sypris has strong capabilities in identity authentication and key management, and it promotes an agile, innovative culture by partnering with leading-edge technology companies, agencies and universities.

Sypris has developed a robust Identity Authentication and Key Management System (CKMS) that allows organizations to securely verify the identity of the device and user, as well as the integrity of the data of millions of endpoints. The CKMS product provides key management for a strong host intrusion prevention capability for enterprise networks. Sypris will integrate CKMS into McAfee ePO, allowing McAfee users to manage the identity and authentication of each endpoint from a single interface.

TaaSERA

TaaSERA’s malware behavior detection solutions, used by a number of leading government agencies, identify previously unseen attacks as they happen. TaaSERA’s software solutions leverage patented real-time, real-world behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out — providing organizations with the specific information necessary to adjust defenses and remediate infections before they become a breach.

Combining TaaSERA’s evidence-based behavior detection functionality with McAfee ePolicy Orchestrator (McAfee ePO) will allow users to identify zero-day infections sooner, enabling virus and malware scanning and remeditation more quickly than before. This capabilitity will mitigate the risk of malware resulting in a breach.

Tangoe

Tangoe is a leading global provider of Communications Lifecycle Management (CLM) software and services to a wide range of global enterprises. CLM encompasses the entire lifecycle of an enterprise’s communications assets and services, including planning and sourcing, procurement and provisioning, inventory and usage management, invoice processing, expense allocation and accounting, and asset decommissioning and disposal. Tangoe’s Communications Management Platform (CMP) is an on-demand suite of software designed to manage and optimize the complex processes and expenses associated with this lifecycle for both fixed and mobile communications assets and services. Tangoe’s customers can also manage their communications assets and services by engaging Tangoe’s client service group.

By integrating with McAfee ePO, Tangoe gives McAfee users the ability to proactively manage their mobile expenses in real-time. In addition, McAfee users can also implement a wide variety of customizable device policies for their mobile fleet, and simultaneously boost security. McAfee ePO software users can now ensure the reliability of wireless budgets and ultimately protect their companies from “Bill Shock.”

McAfee Compatible solution:
Tangoe rTEM 1.0 and McAfee ePO 4.5 and 4.6.

TeraDact

TeraDact™ Solutions offer an advanced toolset for the management of sensitive information. TeraDact’s software improves upon the existing, at times inefficient, means of protecting sensitive data while ensuring compliance with current information management and sharing policies. Its technology enables users to manually or automatically check, version, and release the right information to the right audience at the right time by utilizing TeraDact’s proprietary sharing and redaction software. TeraDact’s unique and patented Information Identification and Presentation (IIaP™) capabilities make certain that sensitive information such as classified data, personally identifiable information (PII), protected health information (PHI) and all material deemed sensitive by policy or regulation is effectively identified, appropriately labeled and acted upon before changing hands. Information identified for removal, including all of its associated underlying meta-data, is removed thereby eliminating any possibility of a breach because the data no longer resides in the document. TeraDact’s current market focus centers on Government (Information Sharing, FOIA, Declassification), Healthcare (HIPPA, HITECH), Financial Services (SOX) and Legal (E-Discovery and Confidential Filings with Regulatory Authorities).

With TeraDactor's granular approach to producing sanitized documents tailored according to audience, customers are assured protection against potential costs and repercussions resulting from a data breach or non-compliance. TeraDact will integrate TeraDactor with McAfee ePO to enable customers to effectively manage content sharing policies, compliance auditing, collaborative content review, and content checking and redaction processes across multiple repositories and workflows.

TITUS

TITUS® is a leading provider of security and compliance software that helps organizations share information securely while meeting policy and compliance requirements. TITUS solutions raise awareness and meet regulatory compliance by visually alerting end users to the sensitivity of information. Products include TITUS Classification, a leading message, document, and file classification and labeling solution; TITUS Aware, products that enhance data loss prevention by detecting sensitive information at the desktop; and the TITUS family of security solutions for Microsoft SharePoint. TITUS solutions are deployed to more than 1.5 million users within more than 300 military, government, and enterprise customers worldwide.

TITUS email and document classification complements McAfee Data Loss Prevention (DLP). The integration between TITUS products and McAfee DLP further reduces an organization’s risk of data loss. It does this by capturing end users' inherent knowledge about the sensitivity of documents and making that information available to McAfee host- and network-based DLP in the form of metadata for more accurate decisions and reduced false positives. Read the solution brief for more details.

McAfee Compatible Solution:
TITUS Message Classification v3.5, TITUS Classification for Microsoft Office v3.5, TITUS Classification for Desktop v1.1 with McAfee DLP v9.2 and McAfee ePO v4.6.

Tiversa

Tiversa is a global leader in peer-to-peer (P2P) intelligence and security, serving corporations, global law enforcement, government agencies, and individuals. Its patented technologies can monitor over 550 million users issuing over 1.8 billion searches per day. Tiversa can locate and record exposed sensitive documents in real time, provide geo locations and identities of document disclosure sources, record user-issued searches, and assist in risk mitigation and remediation.

Tiversa has integrated its P2P Breach Protection solution with the McAfee ePolicy Orchestrator (McAfee ePO) platform, providing customers with data loss visibility beyond the corporate perimeter. Tiversa P2P Breach Protection is segmented into three offerings: Corporate Breach Protection, SMB Breach Protection, and Federal Breach Protection. All include real-time data disclosure detection and advanced P2P forensics to mitigate risk, enabling customers to proactively safeguard their sensitive data within the extended enterprise of suppliers, partners, agents, customers, and remote employees. Read the solution brief for more details.

McAfee Compatible Solution:
Tiversa Breach Protection and McAfee ePO 4.5 and 4.6.

Tomium

Tomium Software develops enterprise-class systems software specializing in innovative high value tools and utilities for business critical z/OS mainframe systems. Their products are designed for high performance, reliability, integrity, and ease of use. Tomium leadership, technical, and support teams have many decades of experience developing and supporting enterprise IT environments.

Tomium Activity Monitor for DB2 is the most efficient real-time collector of auditing data for DB2 running on z/OS. It satisfies the requirements of both the auditor and the IT by streaming the data needed to meet regulatory or compliance requirements with the smallest impact to the z/OS environment. Tomium Activity Monitor for DB2 – McAfee Edition will integrate seamlessly with McAfee Database Activity Monitoring to offer a solution to auditors that need to monitor both mainframe and non-mainframe environments from a single console. Read the solution brief for more details.

McAfee Compatible Solution:
Tomium Activity Monitor for DB2 (McAfee Edition V2.1) and McAfee Database Activity Monitor (DAM) version 4.4.1.

Topia

Topia Technology is an innovative provider of solutions that securely move and manage data in complex distributed systems. Each solution utilizes proprietary shredding and multi-layer encryption to provide military-grade security for data at-rest and in-transit, ensuring the highest degree of: data integrity, availability, performance and end-to-end data governance. Topia Technology solutions leverage enterprise infrastructure assets and provide secure syncing and sharing across any device and data repository; lowering total cost of ownership and maximizing workflows.

Topia Technology’s Enterprise File Sync and Share Platform (EFSS), Skoot, extends McAfee’s ePO security features by providing insight into individual files. This powerful combination of McAfee’s ePO and the Skoot Platform provides event information, analysis, auditing, and reporting on file data as it is shared or synced. As files are securely shared both inside and outside the enterprise, the Skoot Platform reports the source, destination, and selected recipient information that can then be used to enforce policy through McAfee’s ePO.

Toshiba Storage Device Division (SDD)

Toshiba Storage Device Division (SDD), a division of Toshiba America Information Systems, is a market leader in the development, design, and manufacturing of small form factor 2 1/2" and 1 1/8" hard disk drives for original equipment manufacturers, value-added resellers, value-added dealers, systems integrators, distributors, and retailers in the United States. Toshiba SDD also offers a line of personal storage devices that enable consumers to quickly and easily back up personal digital content and entertainment libraries.

Toshiba and McAfee will work to integrate Toshiba’s self-encrypting drive technologies with McAfee data security solutions and upon completion, Toshiba’s products will comply with the Trusted Computing Group’s trusted storage device specifications.

Trapezoid Digital Security Services

Trapezoid is a leader in Trust Data Intelligence (TDI), providing hardware based security architecture solutions for enterprise cloud environments. Through a portfolio of innovative products and managed services, Trapezoid engineers security infrastructure using Intel® Trusted Execution Technology (Intel TXT) for a growing roster of Global 2000 companies. By establishing security policies that take into account hardware data, Trapezoid provides the first ever actionable and reportable hardware-centric security posture.

Trapezoid has teamed with Intel to use Intel TXT trusted values and incorporate these into real world use cases. These use cases will highlight the importance of hardware trust as part of an enterprise’s or cloud provider’s overall security posture. Intel TXT, part of Intel® Xeon® processor E5-family based servers, enables an end user to validate and attest that they are running their applications on both trusted hardware and a trusted hypervisor. In addition, Trapezoid is working with Intel® Identity Protection Technology (Intel® IPT) and Intel® Expressway Cloud Access 360 to help clients work securely on cloud environments. As part of the SIA program, Trapezoid will integrate with McAfee ePO and McAfee SIEM technologies to deliver policy-based management on trusted endpoints.

Triumfant

Triumfant offers a one-of-a-kind ability to discover, diagnose, and repair unwanted changes and unexpected conditions on endpoint computers and servers, and automatically corrects those changes and conditions that are problematic to the security, configuration, and performance of each machine.

The integration of Triumfant Resolution Manager (TRM) with the McAfee ePolicy Orchestrator (ePO) platform allows users to view the unwanted changes and unexpected conditions detected by TRM through the ePO console. Users can switch from ePO to TRM to view the details of the changes detected, review and execute the synthesized remediation, and execute reports. This integration provides ePO users with additional insight into the security readiness of the endpoint population through Triumfant’s ability to identify and analyze unusual changes to each machine. Read the solution brief for more details.

McAfee Compatible solution:
Triumfant Resolution Manager 4.3.3 and McAfee ePO 4.0.

Trustware

Trustware is a pioneer in securing desktop applications through virtualization. Trustware’s patented technology, BufferZone, seamlessly virtualizes browsers and other applications, and isolates untrusted programs, including zero-day threats, which promulgate via Internet-facing applications. BufferZone’s virtualization technology simulates a PC’s system in a virtual mode that permanently protects the file system, registry, confidential data, and network from unknown threats. By isolating unauthorized programs and files in its secure environment, BufferZone prevents any hidden threats from monitoring or damaging PC assets or networks. BufferZone’s low overhead and manageability provide IT with an additional security layer that is transparent to the end user without compromising performance or IT flexibility.

Trustware’s planned integration with the McAfee ePolicy Orchestrator (ePO) platform enables mutual customers to manage BufferZone configuration, rule creation, and reporting while leveraging existing investments in McAfee technology to monitor, scan, and remediate BufferZone’s virtual environment.

Validity

Validity Sensors develops a durable, flexible, and high performing biometric fingerprint sensor for information, communication, and entertainment devices. Validity’s fingerprint products enable convenient, secure, and affordable solutions for identity validation, including features such as password replacement, identity verification, centralized management for corporate network security, secure wireless transactions, protection of portable data, and physical access control. As part of the SIA program, Validity will work with McAfee to integrate its authentication solutions with McAfee Endpoint Encryption.

VASCO

VASCO Data Security is the world leader in strong authentication. The company has established a solid reputation in online banking with both authentication and e-signature solutions, and authentication in the application and enterprise security markets. Recently, VASCO launched a range of PKI-based authentication solutions, including DIGIPASS CertiID, a client-based software; and DIGIPASS Key1 and DIGIPASS 860, PKI authenticators. Vasco intends to integrate all of these solutions with McAfee Endpoint Encryption for preboot authentication and disc encryption, adding user authentication for laptop protection to McAfee’s offering.

McAfee Compatible solution:
Vasco DIGIPASS 860 token and McAfee Endpoint Encryption V5 on Windows 2003, 2008, XP, VISTA.

Veracode

Veracode provides independent verification of application security for both internally developed applications and third-party software, without requiring expensive tools or access to source code. Veracode cloud-based testing services offer the most complete, accurate, and cost-effective way to implement application risk management, protect critical applications, and comply with internal security policies and external standards, such as OWASP Top 10, the CWE/SANS Top 25, and PCI.

Veracode’s integration with the McAfee ePolicy Orchestrator (ePO) platform will allow customers to identify applications at risk, queue them for verification, and manage application security improvements and compliance to standards, regulatory requirements, and policies within the Veracode service. Customers will be able to include results uploaded to the ePO platform in corporate policy management practices.

VSS Monitoring

VSS Monitoring is a world leader in Network Intelligence Optimization and Network Packet Brokers (NPB), providing a visionary, systems approach for optimizing and scaling the connectivity between network switching and the network intelligence universe of analytics, security, and acceleration tools.

Building upon the interoperability of VSS Monitoring’ Distributed and TAP Series with McAfee Network Security Platform (NSP), VSS Monitoring will integrate its Network Packet Broker (NPB) solutions with McAfee NSP, as well as other platforms in the near future, enabling customers to maximize the ROI of McAfee Network Security solutions while achieving unprecedented visibility and scale. With VSS Monitoring, McAfee customers gain multiple important benefits, including the ability to easily scale their McAfee Connected Security from 1G to 10G networks, as well as provide real-time analysis and response through powerful line-rate time and port stamping of packets. Read the solution brief for more details.

McAfee Compatible solution:
VSS Monitoring Distributed and TAP Series products are compatible with the McAfee Network Security Platform 7.0.

Waterfall Security

Waterfall Security Solutions Ltd. is the leading provider of Unidirectional Security Gateways™ and data diodes for industrial networks, SCADA systems, remote monitoring systems and isolated networks. Waterfall Gateways secure industrial networks from network attacks originating on external networks. Waterfall’s security solutions make it straightforward for utilities and critical infrastructures to achieve compliance with NERC-CIP, NRC, NIST and other regulations as well as with cyber-security best practices. Waterfall’s offerings include support for leading industrial applications, such as: OSIsoft PI™ Historian, GE Proficy™ iHistorian, the Siemens SIMATIC™ and the GE OSM™ remote monitoring platforms, and leading industrial protocols, such as: OPC, Modbus, DNP3 and ICCP.

Waterfall Unidirectional Gateways provide McAfee NitroView SIEM installations with visibility into security events and other information in segregated critical-infrastructure networks. In addition, McAfee and Waterfall have cooperated to test, validate and support Waterfall for NitroView, a Waterfall solution which replicates McAfee NitroView data out of Waterfall-isolated networks. The solution permits the industry-leading NitroView SIEM and other NitroView components inside of security-isolated networks to secure and manage those isolated networks, while still providing visibility into those networks for enterprise-wide NitroView SIEM installations.

McAfee Compatible solution:
Waterfall Unidirectional Gateway and McAfee Enterprise Security Manager (formerly NitroView).

WCK

WCK (White Cyber Knight) provides a Governance, Risk and Compliance (GRC) solution which brings clear visibility into the organization’s cyber & IT security risks and their impact on the business. Organizations can use the WCK Business Security Risk Managenent (bSRM) system and decision support tools to prioritize security improvements based on their business needs and security strategy. WCK-bSRM can combine risk management for IT, physical security, and control systems security, providing a unique value for critical infrastructure and manufacturing firms. The solution is simple to implement and use, and enables short time to value – customers can gain insight into their risk posture from existing data within a week from installation.

The integration of WCK-bSRM with the McAfee ePO platform adds the business context to the elements managed by ePO, providing management insight into the business relevance of these elements. By analyzing the dependencies between IT components, systems, business processes and organizational units, WCK-bSRM improves the visibility of the organization’s security risk for assets managed by the ePO platform. Read the solution brief for more details.

McAfee Compatible solution:
WCK-bSRM V 2.10 and McAfee ePO 4.6.

WizNucleus

WizNucleus is an innovative provider of NERC CIP compliance process automation products for the energy sector. The company is supported by a strong technology platform and industry partnerships. With origins in the nuclear power plant sector, WizNucleus products have built-in and proprietary technology for automating the entire compliance process, which drastically reduces overall compliance costs. The products are specifically designed for the latest regulatory standards.

NERC-Wiz comprehensively addresses all aspects of NERC CIP 002-009 compliance process automation, including cyberassets and evidence management, ESP/PSP definition, network diagramming, personnel risk assessment, change control, documentation, and TFE management. The reporting and audit preparation aspects of the product makes a NERC audit painless. The integration of NERC-Wiz with McAfee Enterprise Security Manager will provide a dynamic and automated compliance management platform that will receive correlated events and alerts based on preconfigured rules.

Xerox

Xerox Corporation is a leading provider of business process and document management. Its technology, expertise, and services enable workplaces – from small businesses to large global enterprises – to simplify the way work gets done so they operate more effectively. The company also provides extensive leading-edge document technology, services, software and genuine Xerox supplies for graphic communication and office printing environments of any size.

Xerox has integrated its first networked multifunction printer to use McAfee Embedded Control software, a sophisticated filtering method that allows only approved programs to get through. The Xerox and McAfee security solution simplifies processes for IT administrators with software embedded into a multifunction device’s controller (the machine’s main onboard computer) to provide an immediate alert and audit trail to track and investigate the time and origin of security threats – and take appropriate action. This eliminates the need for IT administrators to constantly stay on top of malware threats and proactively block them.

McAfee Compatible solution
Xerox MFP extension 1.0 and McAfee ePO 4.6.

ZFElectronics

ZF Electronics (formerly the Cherry Corporation) operates as an independent business unit within the ZF Group. The company develops and produces computer input devices, switching systems, sensor technology, and controls. The well-known Cherry brand is now managed under ZF Electronics’ computer input devices and switches and controls product segments. ZF Electronics has 3,100 employees worldwide and generated total sales of approximately €250 million in 2009.

Most Cherry smart card readers and keyboards are interoperable with McAfee Endpoint Encryption, providing joint customers with a secure identity protection solution.

McAfee Compatible solution:
McAfee Endpoint Encryption v5 (on Windows XP, Vista, 2003, and 2008) and Cherry smart card readers, standalone or built into keyboards, models ST-1044, ST-1210, G83-6744 and G83-6644.

SIA Partner Award 2013

Témoignages de clients

« Grâce à la solution conjointe de CommVault et McAfee, Ellis Medicine est en mesure de mieux corréler la sécurité et la gestion des données en vue de réduire le coût et la charge administrative tout en améliorant la protection contre les menaces et la conformité globale. Que la gestion de la sécurité englobe non seulement les postes clients mais aussi la gestion des données et la protection du réseau représente un atout exceptionnel. »
– Rodney Kowalczyk, ingénieur réseau, Ellis Medicine


« Bank of the West utilise McAfee ePO pour gérer la sécurité des postes clients et LogRhythm pour effectuer la corrélation des événements et la surveillance en temps réel. L'intégration des deux produits est très avantageuse pour nous, notamment dans la mesure où elle permet de réagir plus efficacement et plus rapidement face à des événements de sécurité critiques sur les postes clients. »
– Matt Nelson, ingénieur responsable de la sécurité informatique, Bank of the West


« Citrix collabore avec plusieurs éditeurs de solutions de sécurité et s'intéresse tout particulièrement aux intégrations entre produits capables d'améliorer la protection et la conformité. Nous avons d'ores et déjà identifié deux intégrations multifournisseurs de ce type au sein du programme SIA de McAfee et en recherchons d'autres. »
– Tom Krawczyk, directeur de l'architecture de sécurité, Citrix Systems


« McAfee Endpoint Encryption est un composant essentiel de notre modèle de protection multiniveau contre l'accès non autorisé aux données et l'ajout d'Imprivata OneSign nous permet de mettre en œuvre l'identification unique pour un maximum d'applications. L'intégration entre les deux produits était indispensable pour améliorer la stabilité et, partant, pour diminuer les coûts d'exploitation dans la mesure où les deux solutions constituent la véritable base d'un système de sécurisation des postes clients distribué. Nous sommes en passe de réaliser notre objectif ultime, à savoir qu'une authentification forte intervienne une seule fois, au moment du démarrage initial du système. Par la suite, nos utilisateurs pourront accéder plus efficacement et en toute transparence à tous les systèmes et applications qu'ils sont autorisés à utiliser, sans devoir saisir de multiples mots de passe, ce qui se traduira par une sécurité renforcée et une productivité accrue.

En outre, grâce à la toute nouvelle technologie d'Imprivata, nous pourrons utiliser les webcams de nos ordinateurs portables HP 8530W afin de verrouiller efficacement ceux-ci lorsque l'utilisateur n'est pas physiquement présent. L'association de cette solution à McAfee Endpoint Encryption devrait nous permettre, en toute logique, d'améliorer remarquablement notre profil de risque tout en continuant à offrir aux utilisateurs un environnement extrêmement convivial. »
– David O’Berry, directeur des systèmes et services d'information, Bureau de probation, de libération conditionnelle et d'amnistie de l'Etat de Caroline du Sud

Témoignages de partenaires

« Le programme SIA de McAfee a fortement contribué à faire progresser l'interopérabilité multifournisseur. Grâce à sa collaboration avec McAfee, ActivIdentity a pu participer au développement d'une solution plus complète de chiffrement, d'authentification et de gestion des identités. »
– Jerome Becquart, vice-président des produits et des services, ActivIdentity


« Pour Absolute Identification, le programme SIA de McAfee s'est avéré un tremplin inestimable. Grâce au programme, nous avons pu collaborer étroitement avec les équipes de gestion et de vente de McAfee à la réalisation de nombreuses actions de marketing et de développement des ventes au cours de l'année écoulée, ce qui nous a procuré un grand nombre d'avantages. »
– Don Ritzman, président-directeur général, Absolute Identification


« Grâce au programme SIA de McAfee, Gemalto a pu proposer aux entreprises une solution à l'interopérabilité garantie. Celle-ci est capable de fournir une authentification renforcée à un stade précoce de l'accès au système, ce qui a permis à la société d'élargir considérablement ses opportunités commerciales. »
– Cedric Collomb, vice-président directeur, Gemalto


« La conférence pour les développeurs SIA nous a aidés à donner un coup de fouet à notre projet d'intégration avec McAfee et à mieux appréhender les clés du succès. »
– Della Lowe, directrice du marketing d'entreprise, AirTight Networks