Intel McAfee Secures Embedded And Mobile Devices

Intel will use assets acquired from McAfee to build security features right into the chip for embedded devices and to provide cloud security services for mobile devices.

Two weeks after closing the McAfee acquisition, Intel executives explained the rationale behind the $7.7 billion (£4.8 billion) deal in a conference call with Wall Street analysts. Renee James, an Intel senior vice-president and general manager of the Software and Services group, and Dave DeWalt, president of the wholly-owned but independent McAfee subsidiary, discussed how McAfee’s products and systems would protect mobile devices and embedded applications from cyber-attacks.

“Malware is blowing off the charts,” explained DeWalt. “I’ve never seen anything like it. And on top of this, the number of devices is exploding.”

On-chip Security Management

Intel wants to build security management capabilities directly into hardware that would allow mobile and other endpoint devices to communicate in real-time with cloud-based services. The services will provide up-to-date protection for the devices including detecting and blocking malware, authenticating users and verifying IP addresses and Web sites, James said.

Intel could have bought smaller companies to build up its security business and spent less, but realised very quickly the company needed both security software and a complete service platform, James said. McAfee already had a security service cloud that it had been working on for five years in addition to security software, she said. It would have taken Intel far too much time and a lot of money to replicate what McAfee had already done, James said.

McAfee will be extending security capabilities and visibility into small embedded devices that can be used by attackers to gain access into enterprise networks such as laptops, smartphones and tablets, DeWalt said. Intel can develop embedded computers for printers, televisions, and cars, and bake security right into the device, he said. He also noted the security needs of nuclear power plants during the conference call.

McAfee would work closely with the Wind River subsidiary, which makes operating system software for a variety of embedded devices including ATMs and network gateways, according to DeWalt. McAfee is set to roll out McAfee for Wind River at the end of the month.

“We can bake security directly into the OS, directly with manufacturers,” DeWalt said.

The plan is to provide more security-assisting features on Intel’s future chips that help speed up and improve McAfee software performance. Instead of running security as a layer on top of the operating system, Intel wants to push it down below, DeWalt said. The company already has chip-based features, such as VT, which secures and manages virtualised environments, James said.

“The further you move security down the stack, the more visibility of the architecture you get,” DeWalt said.

By expanding McAfee’s ePolicy Orchestrator framework, businesses can remotely manage laptops and other endpoint devices with Intel vPro technology, such as accessing the device, decrypting or encrypting the data, and applying patches, according to DeWalt.

“Now we can give one pane of glass to view all these devices on the network,” said DeWalt

McAfee may have been just an anti-virus software vendor five years ago, but since then has expanded into firewalls, intrusion prevention, servers, storage, and endpoint security for mobile devices, DeWalt said. The mobile security products are either embedded in the device or sold by cellular phone carriers, and provide features such as remote wipe, encryption and location awareness, he said.

Mobile Security Awareness Growing

Even though McAfee has been in the mobile security market for five months, in the fourth quarter of 2010, it added 1.25 million users, DeWalt said. Another 246 enterprises have deployed McAfee software on to mobile devices and internal networks, including the United States government, he said.

With an installed base of over 300 million endpoints, McAfee products can track what is happening in real-time on endpoints by processing messages and sending information back to the company’s back-end security systems for analysis, DeWalt said.

Intel has acquired over 20 software companies over the past three years, retained more than 90 percent of the employees, and gained access to valuable intellectual property, James said. Examples included WindRiver, which gave Intel a broad and deep access to the embedded systems market, and Havok, a gaming company, whose engineers were “instrumental” in designing the feature set for Sandy Bridge chips, according to James.

Intel plans to make more security acquisitions, and future acquisition will be managed by DeWalt, James said.

“People will pay for security,” James said, noting that it’s not a PC/embedded issue. “It’s an enterprise, PC, handset/mobile, embedded across the board,” she said.

Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Share
Published by
Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Recent Posts

Tesla Shares Surge On China Advanced Self-Driving Push

Tesla makes key advances toward advanced self-driving rollout in China as chief Elon Musk meets…

2 hours ago

UK Law Aims To Boost Security For ‘Smart’ Devices

New UK rules bring in basic security requirements for millions of internet-connected devices, aiming to…

3 hours ago

Alphabet Value Surges Over $2tn On Dividend Plan

Google parent Alphabet sees market capitalisation surge over $2tn on plan to over first-ever cash…

9 hours ago

Google Asks US Court To Dismiss Federal Adtech Case

Google asks Virginia federal court to dismiss case brought by US Justice Department and eight…

10 hours ago

Snap Sees Surge In Users, Ad Revenues

Snapchat parent Snap reports user growth, revenues in spite of tough competition, in what may…

10 hours ago

Shein Subject To Most Stringent EU Digital Rules

Quick-growing fast-fashion company Shein must comply with most stringent level of EU digital rules after…

11 hours ago