Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

McAfee Takes Endpoint Security Management to the Hardware Level

McAfee ePO Deep Command enables remote security management access to PCs that may be powered off or disabled.

McAfee continued its push in leveraging hardware technology to improve security this week with the unveiling of McAfee ePO Deep Command.

McAfee ePO Deep Command enables remote security management access to PCs that may be powered off or disabled.

McAfee continued its push in leveraging hardware technology to improve security this week with the unveiling of McAfee ePO Deep Command.

McAfee LogoDeep Command takes advantage of hardware-based capabilities built into laptop and desktop PCs using Intel Core i5 vPro and Intel Core i7 vPro processors. The goal: to use Intel’s Active Management Technology (AMT) to empower administrators to remotely remediate compromised systems regardless of their PC’s power state. By leveraging the Intel AMT Alarm Clock feature, the product gives admins the ability to power on PCs and execute security tasks, according to McAfee.

“Enterprise PCs must be available for end users to be productive,” said Brian Foster, senior vice president of product management at McAfee, in a statement. “McAfee ePO Deep Command enables security administrators to quickly respond to disabled PCs with a remote call for help functionality to ensure proper security is in place to protect against today’s fast propagating threats. McAfee ePO Deep Command allows enterprises to reduce the cost of security operations and manage endpoint security beyond-the-operating system.”

The company made the announcement at its FOCUS 2011 conference in Las Vegas. According to McAfee, ePO Deep Command can send any number of security tasks to an endpoint, such as updating a DAT file or making a security policy change. This allows the security administrators to quickly assess the necessary steps needed to remediate the endpoint, allowing the user to get back to work faster.

McAfee ePO Deep Command and Intel Core vPro processors provide a compelling security management solution that enables malware detection and removal regardless of the PC’s power state,” said Rick Echevarria, vice president of Intel Architecture Group and general manager of Business Client Platforms at Intel, in a statement. “With the ePO Deep Command taking advantage of unique vPro capabilities, IT regains control over its PC fleet through remote remediation of compromised systems, cost- and power-saving opportunities, and the application of policy-based proactive security measures beyond what can be provided within the OS alone.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem