Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

McAfee Unveils Hardware-Assisted Security to Combat Sub-Operating System Threats

McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.

Dubbed DeepSafe, the technology enables McAfee to develop hardware-assisted security products that take advantage of a “deeper security footprint,” according to the company. The technology sits below the operating system, which officials hope will allow McAfee to proactively block rootkits that bury themselves in the OS to avoid detection.

McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.

Dubbed DeepSafe, the technology enables McAfee to develop hardware-assisted security products that take advantage of a “deeper security footprint,” according to the company. The technology sits below the operating system, which officials hope will allow McAfee to proactively block rootkits that bury themselves in the OS to avoid detection.

McAfee DeepSafeThe technology – the latest child of Intel’s acquisition of McAfee in February – was demonstrated earlier this week at the Intel Developer Forum during Intel President and CEO Paul Otellini’s keynote. According to McAfee, more than 1,200 new rootkits are detected each day.

“Intel and McAfee are working on joint technologies to better protect every segment across the compute continuum from PCs to devices,” said Renée James, senior vice president and general manager of the Software and Services Group at Intel and the Chairman of McAfee, in a statement. “By combining the features of existing Intel hardware and innovations in security software, Intel and McAfee are driving innovation in the security industry by providing a new way to protect computing devices. We are truly excited to introduce this technology upon which we will deliver new solutions.”

McAfee DeepSAFE:

  • Builds the foundation for next-generation hardware-assisted security operating beyond the operating system 
  • Provides a trusted view of system events below the operating system 
  • Exposes many attacks that are undetectable today 
  • New vantage point to block sophisticated stealth techniques and APTs 
  • Provides real time CPU event monitoring with minimal performance impact 
  • Combines the power of hardware and flexibility of software to deliver a new foundation for security

DeepSafe is slated to launch in products later this year.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Data Protection

By implementing strong security practices,, organizations can significantly reduce the risks associated with lost and stolen computers and safeguard their sensitive information.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Endpoint Security

The Zero Day Dilemma