Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Announces Strategy for Managing Security in Virtualized Environments

 

New platform and API to provide customers a way to unify security management across physical and virtual infrastructures.

 

New platform and API to provide customers a way to unify security management across physical and virtual infrastructures.

McAfee, Inc. (NYSE:MFE) this week announced its strategy to help customers maximize their investments in virtualization with security options for virtualized environments aimed to provide stronger and optimized security controls. McAfee is currently developing a platform and application programming interface (API) to provide a framework that will accelerate and address the specific needs of security for virtualized environments.McAfee MOVE

Security in virtual environments has typically been inefficient and resource intensive, limiting the total number of virtual machines that can be deployed on a singular host. Such challenges have jeopardized the long-term operational expected savings that organizations have hoped to achieve with virtualization. Companies are deploying virtualization within their environments based on best fit and ease of management. There are limited choices for security, deploy traditional endpoint security within the virtual machine or utilize a hypervisor vendor’s proprietary API.

The new platform, McAfee Management for Optimized Virtual Environments (MOVE) platform, is designed to provide a common way to develop across the hypervisor vendors, offload resource intensive actions like security policy checking outside of the individual virtual machines and optimize scheduling of these actions based on the overall state of the hypervisor. McAfee plans to provide open source to its partners for security innovation, accelerating future virtual-adaptive offerings for the enterprise market. Utilizing the MOVE platform, McAfee intends to release A/V Offloading as its first product for customers.

“McAfee MOVE will provide the platform for leveraging new and existing virtualized architectures to significantly reduce the overhead of protecting individual machines,” said George Kurtz, chief technology officer for McAfee. “Security within virtualized environments is one of our customers’ main concerns. We believe that enhancing the overall protection of these environments will lead to increased adoption of virtual machines with significant costs savings.”

McAfee MOVE will provide a platform in which McAfee and partners will be able to leverage to provide specifically designed security for virtualized environments. McAfee ePolicy Orchestrator platform will provide the user interface to configure and manage products developed on the MOVE platform. MOVE will facilitate VM tagging, so that regardless of the location within the virtualized environment or its context, continued security management will be possible with the ePolicy Orchestrator platform.

The MOVE platform also is expected to provide the following features and benefits:

• Programming interface that is sound and secure being thoroughly tested and verified, allowing a common path and to develop to all of the major hypervisor vendors.

Advertisement. Scroll to continue reading.

• Context aware platform, leveraging enhanced virtualized infrastructure security capabilities from the individual hypervisor vendors when available increasing security and optimization options when deployed in context specific environments

• Opportunity to enhance offerings with future API extensions as partnerships grow and new virtualization models and features develop.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.