Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

McAfee Unveils Hardware-Assisted Security to Combat Sub-Operating System Threats

McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.

Dubbed DeepSafe, the technology enables McAfee to develop hardware-assisted security products that take advantage of a “deeper security footprint,” according to the company. The technology sits below the operating system, which officials hope will allow McAfee to proactively block rootkits that bury themselves in the OS to avoid detection.

McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.

Dubbed DeepSafe, the technology enables McAfee to develop hardware-assisted security products that take advantage of a “deeper security footprint,” according to the company. The technology sits below the operating system, which officials hope will allow McAfee to proactively block rootkits that bury themselves in the OS to avoid detection.

McAfee DeepSafeThe technology – the latest child of Intel’s acquisition of McAfee in February – was demonstrated earlier this week at the Intel Developer Forum during Intel President and CEO Paul Otellini’s keynote. According to McAfee, more than 1,200 new rootkits are detected each day.

“Intel and McAfee are working on joint technologies to better protect every segment across the compute continuum from PCs to devices,” said Renée James, senior vice president and general manager of the Software and Services Group at Intel and the Chairman of McAfee, in a statement. “By combining the features of existing Intel hardware and innovations in security software, Intel and McAfee are driving innovation in the security industry by providing a new way to protect computing devices. We are truly excited to introduce this technology upon which we will deliver new solutions.”

McAfee DeepSAFE:

  • Builds the foundation for next-generation hardware-assisted security operating beyond the operating system 
  • Provides a trusted view of system events below the operating system 
  • Exposes many attacks that are undetectable today 
  • New vantage point to block sophisticated stealth techniques and APTs 
  • Provides real time CPU event monitoring with minimal performance impact 
  • Combines the power of hardware and flexibility of software to deliver a new foundation for security

DeepSafe is slated to launch in products later this year.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Endpoint Security

The Zero Day Dilemma

Application Security

Less than a week after patching critical security defects affecting multiple enterprise-facing products, VMware is warning that one of the flaws is being exploited...