Connect with us

Hi, what are you looking for?


Endpoint Security

New McAfee Program Enables Partners to Achieve Compatibility Certification

McAfee Enables Partners to Achieve Product & Service Compatibility Certification

McAfee Enables Partners to Achieve Product & Service Compatibility Certification

McAfee today announced its new technology partner program, designed help its partners ensure their products and services are compatible with McAfee-based solutions. The program’s testing process helps ensure that the third-party hardware, software and services that customers choose perform well, and are compatible with McAfee technology.McAfee Partner Program

The program, “McAfee Connected,” allows independent software vendors and service providers to self-certify their products, solutions, and services as compatible with McAfee technology and provides assurance to customers that enterprise solutions have been tested for compatibility. With the new program, McAfee claims that customers can enjoy reduced testing costs, simplified purchase cycles, and increased solution confidence.

“Choosing hardware and software is a process fraught with difficult decisions that can have very expensive consequences,” said Gerhard Watzinger, executive vice president of corporate strategy for McAfee. “When customers and prospects see that solutions are part of McAfee Connected, they’re able to quickly and easily choose technology that is proven to enhance their McAfee-based deployments.

The McAfee Connected program has been rolled out globally, but the initial focus of it is security management in virtual environments. Just last week, McAfee and Citrix Systems delivered the first product of a joint collaboration announced earlier this year to make virtual desktop security simpler and more scalable for large enterprise deployments.

“Our participation in the McAfee Connected Partner Program helps Citrix deliver increased value to our customers by ensuring McAfee MOVE AV 1.5 and Citrix virtualization solutions perform well together,” said Garry Olah, vice president of business development at Citrix. “Citrix virtualization, networking and cloud technologies radically simplify computing for millions of users, to deliver IT as an on-demand service that enables virtual work styles for users and increased business agility for IT.”

Cloud.Com is another partner that has taken part in the McAfee Connected program. “Cloud security and data integrity are top of mind for CIOs, limiting the broad adoption of cloud computing in the enterprise. Through our engagement with the McAfee Connected program, CIOs will have increased confidence that their existing security programs and policies will be extended to the cloud by using our “McAfee Validated” cloud computing platform,” said Peder Ulander, Chief Marketing Officer at

In the coming months McAfee will add other McAfee-based security solutions to the program. Independent software vendors, developer organizations, and professional and managed services organizations are able to apply for partnership in the program.

Advertisement. Scroll to continue reading.

More information on McAfee Connected is available at:

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.