Embedded Security Software & Solutions

Securing the world’s embedded systems and devices

Next Steps:

Overview

McAfee embedded security solutions help manufacturers ensure their products and devices are protected from cyberthreats and attacks. McAfee embedded system and device security solutions span a wide range of technologies, including application whitelisting, anti-virus and anti-malware protection, device management, and encryption — and all leverage the industry-leading McAfee Global Threat Intelligence. Our solutions can be tailored to meet the specific design requirements for a manufacturer’s embedded device and its architectures.

With McAfee solutions for embedded devices, manufacturers can implement a complete line of security features, including:

  • Anti-malware protection — McAfee’s application whitelisting solutions prevent malware from ever compromising and infecting embedded devices. 
  • Comprehensive threat awareness and analysis — Where devices need to access the Internet and communicate across networks, McAfee’s robust Global Threat Intelligence ensures that the traffic coming across the network is safe for devices to use. 
  • Strong data encryption — When devices need to communicate securely, McAfee embedded security software protects data at rest and in motion. 
  • Streamlined device management — Easily monitor, manage, and maintain large, globally dispersed deployments of embedded devices. 
  • Compliance with federal and industry regulations — Ensure devices fall within the various compliance and regulatory frameworks. 
  • Data loss prevention — Ensure the highest levels of protection for sensitive data on devices.

Protect critical infrastructure and industrial controls

Read White Paper

Challenges and best practices for securing POS systems

Read Report

Security that’s built-in not bolted on

McAfee Embedded Control

Read White Paper

Problems We Solve

  • Lack of zero-day protection
    Hackers and cyberthieves create and release more unique and virulent malware than ever before, so it is critical to secure embedded systems with solutions that prevent zero-day attacks. McAfee’s whitelisting solution is a wholly new approach to solve security threats on embedded devices.
  • Unauthorized software changes on production devices
    Unapproved changes to all types of embedded devices and equipment can lead to costly system shutdowns as well as create exposure to data loss, unanticipated loss of device control, and various regulatory fines and penalties. Application whitelisting and change control can help prevent these problems and boost device security.
  • High partner support costs related to device security problems
    Unauthorized changes to devices can cause device manufacturers to spend resources resolving system errors and malfunctions. Robust change control features on devices help ensure that support trucks don’t have to be sent out to customers’ facilities.
  • Frequent, costly OS patching
    New security vulnerabilities are discovered and published to the Internet every day. This makes it difficult for manufacturers and their customers to ensure devices are safe and secure from the most recent exploits. With embedded security software such as application whitelisting, manufacturers can lock down the runtime environment and help prevent costly OS patching cycles.
  • High field maintenance costs tied to unauthorized changes
    When unauthorized changes occur to software running expensive equipment (e.g., large medical devices like CT and PET scanners, or automated, robotic manufacturing equipment), both the device manufacturer and the customer can experience significant financial impact. For manufacturers, sending a technician to the customer site to resolve the problem is not only costly but also potentially damaging to the brand and product reputation. Whitelisting and change control security solutions from McAfee ensure these expensive, unauthorized changes never occur in the first place.
  • Meeting PCI compliance requirements
    Retail sales devices used to process customer transactions often require strict adherence to a series of PCI requirements. Application whitelisting and change control help device manufacturers and their customers who use these devices in their stores obtain and maintain PCI compliance.
  • Resource intensive, multiple security device solutions for security and compliance
    Companies often deploy multiple lines of defense from multiple security vendors, but updating and maintaining this complex web of cyberdefenses is challenging. Changing the businesses approach to embedded device security yields substantial cost reduction while improving a company’s security posture. Using a whitelisting approach can dramatically decrease a company’s complex security systems and achieve increased protection against malicious zero-day attacks.
  • System unavailability due to unauthorized changes
    When expensive manufacturing, medical, and financial systems go down due to unauthorized system changes, companies can experience significant financial loss as well as customer dissatisfaction. Designing embedded system security into manufacturers’ devices upfront yields significant benefits for both the device manufacturer as well as the customers that leverage these systems.

Devices We Secure

McAfee technologies support a growing number of embedded devices across multiple industries. With a flexible, open architecture, McAfee security solutions for embedded systems and devices can be customized for your requirements.

  • Aerospace/Defense: Secure communications systems, robotic controls, guidance systems, avionics, targeting and control systems, and wireless networking.  
  • Automotive: Guard sensors, robotics, system to system, telematics, infotainment systems, wireless communications, and networking. 
  • Digital Living: Ensure televisions and home networked devices remain malware-free. 
  • Gaming: Safeguard hand-held gaming devices and gambling kiosks. 
  • Industrial Controls: Protect values, sensors, monitors, robots and robotic systems, communication systems, and networking systems.  
  • Medical: Safeguard pumps, monitors, communications, networking, diagnostics, testing, and scanning systems. 
  • Retail/Point of Sale/Digital Signage: Protect ATMs, registers, point-of-sale systems, kiosks, networked devices, wireless communication systems, digital displays, and lighting. 

 

Supported Systems

Architectures

  • Intel
  • AMD
  • Power PC

Operating Systems

  • Windows
  • Linux
  • Wind River Linux
  • Android

Demos

Demos

This demo details how McAfee Embedded Control helps protect ATMs, registers and other retail systems and devices protected with built-in application whitelisting, change control, and integrated security management.

This demo explains how McAfee Embedded Control helps keep devices secure and operational with built-in application whitelisting, change control, and integrated security management for various industries.

This demo explains how McAfee Antivirus SDK and McAfee Embedded Reputation SDK help keep the data flow within communication devices secure.

This demo explains how McAfee Embedded Control helps keeps office devices secure and operational with built-in application whitelisting, change control, and integrated security management.

Videos

McAfee & Siemens Team up to Provide Industrial Security EVP & CTO Mike Fey discusses how McAfee and Siemens are extending their partnership to enhance the security offerings for industrial customers to protect against rapidly evolving global cyber threats.

McAfee, Intel and WindRiver Collaborate on IoT The Internet of Things (IoT) offers new opportunities for businesses of all sizes and across virtually all industries to develop new services, enhance productivity, improve real-time decision making, solve critical problems and create new consumer experiences. As new devices become connected every day that use various operating systems collect a variety of data, companies are challenged with addressing fragmentation, interoperability and intelligence at the edge. To address these challenges, the McAfee Embedded team is working with Intel and Wind River to deliver a comprehensive hardware and software strategy to unlock the data from the device through the network to the cloud.

Embedded Security at Design West Conference 2013Security Architect Mike Cioffi discusses why Embedded Security is critical and what solutions McAfee offers in this space.

Embedded Security for Medical DevicesLearn about McAfee’s approach and implementation strategy to embedded security on medical devices. Technologies featured include: Embedded Control and McAfee DeepCommand.

Protect Your Printers from Security Breaches and Data ThreatsMcAfee and Xerox have teamed up to provide McAfee's Embedded Control enabled on the latest Xerox multi-functional printers to protect your printers from security breaches and threats to confidential data.

Securing Embedded Systems in RetailFeaturing Mike Cioffi at IDF 2012.

Cyber Security for Medical DevicesFeaturing Tony Magallanez at IDF 2012.

Intel and McAfee Combining Technology to Protect Smart GridsThis video shows how McAfee and Intel combine systems and technologies to seamlessly manage and protect smart grids through intelligent networks, preventing unauthorized access and allowing for a fail-over capability if a breach occurs.

Medical Device Security Demo with McAfee, Intel, and Wind RiverThis demo from the 2011 Intel Developer Forum shows how technologies from Intel, Wind River, and McAfee work together to secure medical devices. The device is protected with McAfee Embedded Control, McAfee's whitelisting technology.

Driving Security Down the Stack
George Kurtz, McAfee chief technology officer, gives a keynote presentation at the RSA Conference 2011.

McAfee - Wind River Partnership
Ken Klein, president of Wind River, discusses the key elements of the partnership with McAfee.

Customer Stories

Amada

Amada relies on McAfee Embedded Control to provide a stable environment for their customer sheet metal machinery.

Highlights
  • Protects Amada machinery and allows for long-term software use.

Grass Valley

Grass Valley Secures Real-Time Broadcasting and Video Production with McAfee Embedded Control

Highlights
  • Protects against viruses and other known threats as well as zero-day and advanced persistent threats.
  • Provides robust protection in an environment in which performance without latency is critical.
  • Requires minimal to no administration, maintenance, or updates.

HelpSystems

HelpSystems is a global provider of solutions that optimize IBM environments.

Highlights
  • Virus protection across all platforms.
  • McAfee Labs research enables global, real-time protection.
  • McAfee brand and reputation help sales efforts.

Ricoh

Ricoh depends on McAfee Embedded control to protect business content displayed on networked whiteboards.

Highlights
  • Whitelist approach provides comprehensive security while facilitating rapid startup and use.
  • Whiteboards can be shipped with security pre-configured and without requiring later updates that might affect performance.
  • McAfee Embedded Control offers scalable security to support future product enhancements.

Sodick

Sodick relies on McAfee Embedded Control to provide networked electric discharge machining (EDM) solutions that comply with customers’ internal security policies.

Highlights
  • Whitelist approach provides comprehensive security without affecting system performance.
  • EDM systems can be confidently installed in customer sites with compliance and IT approval.
  • Embedded security offers protection for today’s highly efficient networked manufacturing environments.

Sysmex

Sysmex securely tests devices in a networked setting with McAfee Embedded Control

Highlights
  • Whitelist approach provides ideal solution for closed lab testing devices.
  • Market leadership based on ability to provide the industry’s most secure solutions.

Thecus Technology Corporation

Thecus Technology Corporation is a leading multinational provider of high-performance digital storage systems, well-known among global customers for its network-attached storage (NAS) solutions.

Highlights
  • Provided simple and fast downloading and installation in minutes without requiring IT support.
  • Integrated seamless and easily with Linux OS.
  • Blocked malware with an impressive success rate of 99%.

Products

Application Whitelisting

McAfee Embedded Control
McAfee Embedded Control

McAfee Embedded Control focuses on solving the problem of increased security risk arising from the adoption of commercial operating systems in embedded systems. Embedded Control is a small-footprint, low-overhead, application-independent solution that provides “deploy-and-forget” security.

Embedded Device Management

McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform and the only enterprise-class software provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection for embedded devices and drives down the cost and complexity of managing risk and security.

Global Threat Intelligence

McAfee GTI SDK powered by McAfee Global Threat Intelligence
McAfee GTI SDK powered by McAfee Global Threat Intelligence

McAfee Global Threat Intelligence (GTI) delivers the most comprehensive threat intelligence in the market. Using a broad network of sensors, it provides visibility across all threat vectors — file, web, message, and network. The McAfee® GTI SDK is a software library that provides an API for obtaining ratings of the trustworthiness of email messages, IP addresses, network connections, and URLs. Those ratings can be are typically integrated by an Embedded device manufacturer directly into their products, typically used to provide protection of data passing through their device.

News / Events

Resources

Data Sheets

McAfee 5700 Scan Engine and .DATs

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Reputation SDK

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control - Retail

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control for Aerospace and Defense

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control for Consumer and Home Networking

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control for Healthcare

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Embedded Control for ICS

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

Maintain Security for XP Systems

Learn about how application whitelisting can maintain security for Microsoft Windows XP systems no longer supported by Microsoft.

Maintain PCI Retail Compliance for Systems No Longer Supported

Learn about how to maintain PCI retail compliance for systems no longer supported.

Reports

Store Systems Security: Preparing for the Paradigm Shift

McAfee and IHL Group surveys retailers on their top concerns for POS System Security.

Retail Reputations: A Risky Business

As a consumer, you can research products, find out about return policies, general pricing, or service issues, but there’s one important piece of information missing—can you trust the retailer’s security and how they protect your information?

Smarter Protection for the Smart Grid

Learn how securing the energy grid requires action on three fronts: technical, cultural, and political.

Caution: Malware Ahead

This report focuses on embedded systems in automobiles and is the first in a series of reports on embedded device security.

Embedded Security for an IP-Enabled World

Forrester discusses how embedded security will be expected to secure data, devices, and networks.

Solution Briefs

Securing the Internet of Things

The Internet of Things (IoT, or Internet-connected smart devices) is rapidly changing the way we live and the way we do business. McAfee is working closely with OEMs to address the expanding security requirements of IoT devices for every layer—devices, connections, the cloud, and data centers.

Intel Gateway Solutions for the Internet of Things

Discover the connectivity and interoperability benefits of intelligent gateways

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

Security for Military Grade Google Android Devices

This solution brief looks at mobile device management and lockdown security from McAfee and Harris Corporation for Android tablets.

Security Consideration for Retail Systems OEMs

Helping OEMs and retailers address a wide range of security challenges, Intel and McAfee have developed solutions that take advantage of leading-edge hardware and software technologies.

Technology Blueprints

Securing ATMs

McAfee has integrated application whitelisting with other important controls — file integrity monitoring and change management — into a single “deploy and forget” solution optimized for ATM devices. McAfee Embedded Control provides tight control over attempted changes, as well as broad visibility into changes to ensure that ATM devices remain up and running and free of malware.

White Papers

Strengthening Security, Control, and Compliance for Retail OEMs and Their Customers

This white paper provides retail OEMs and their customers with insights into the technologies that are part of the McAfee embedded security solution, along with security, management, and compliance benefits made possible by shipping retail devices with security built in. You’ll learn how this integrated solution goes beyond device protection and extends security across the entire retail environment.

POS Security That Pays Its Own Way

Adding McAfee Integrity Control to your POS solution simply makes your offering more appealing to your retailer customers.

Kiosks: The Point of Service Frontier

This paper explores the self-service kiosk solutions available today and explains how dynamic whitelisting and application control can facilitate not only the strongest security for these systems, but also open the door to potential new business models.

McAfee Embedded Control

Learn how McAfee Embedded Control enhances embedded device integrity, maximizing uptime, reducing support costs, and helping to ensure compliance throughout the lifecycle of your devices.

Taking Back Control in Today’s Complex Threat Landscape

This document discusses the role that integrity control plays in defending networks against attack through a focus on two key areas — controlling what applications are allowed to run and how they are run, and protecting systems on the network from configuration changes and mistakes that can allow serious vulnerabilities to be exploited.

Increasing Medical Device Security with Mainstream IT Platforms and Technologies

Although not typically the target of cyberattacks, medical equipment can become "collateral damage" in a malware outbreak, or even be the weak link that opens the door to a cyberattack.

Community

Blogs

  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013

    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]

    The post How Much Are Your Assets Worth? appeared first on McAfee.

  • What is Encryption?
    Robert Siciliano - September 10, 2013

    Encryption is the science of encoding and decoding secret messages.  It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemies. More recently, governments have used encryption for military purposes, but these days the term if often used in reference to online security. Encryption is […]

    The post What is Encryption? appeared first on McAfee.

  • Hesperus (Evening Star) Shines as Latest ‘Banker’ Trojan
    Vikas Taneja - September 6, 2013

    Hesperus, or Hesperbot, is a newly discovered banker malware that steals user information, mainly online banking credentials. In function it is similar to other “bankers” in the wild, especially Zbot. Hesperus means evening star in Greek. It is very active in Turkey and the Czech Republic and is slowly spreading across the globe. This sophisticated […]

    The post Hesperus (Evening Star) Shines as Latest ‘Banker’ Trojan appeared first on McAfee.

  • Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
    Umesh Wanve - September 3, 2013

    Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP network pattern generated contains a few interesting parameters, names like “&av” (for antivirus?) and “&vm=”(VMware?), The response received looked to be encrypted, which drew my attention. Also, all the network traffic contained the same host […]

    The post Cidox Trojan Spoofs HTTP Host Header to Avoid Detection appeared first on McAfee.

  • Five Website Security Do’s and Don’ts for Online Merchants
    McAfee - August 30, 2013

    As we get closer to the end of summer, most merchants are already in the midst of preparing for another busy fall/winter shopping season. However, amid the chaos, it’s important to take a look at your website’s current features—most importantly security—in order to assess what needs improvement before it’s too late. Aside from cosmetic and […]

    The post Five Website Security Do’s and Don’ts for Online Merchants appeared first on McAfee.