McAfee Adds Identity and Access Management to Security Connected
McAfee is adding identity and access management capabilities to its Security Connected portfolio. The vendor's goal is to deliver enterprise-class security to the cloud.
April 30, 2013
McAfee is giving a boost to its Security Connected portfolio with the addition of identity and access management capabilities. They were previously developed and sold by Intel (NASDAQ: INTC), but now McAfee is bringing them to market as McAfee Cloud Single Sign On and McAfee One Time Password.
Additionally, McAfee launched Identity Center of Expertise, which is staffed by experts in identity and cloud security that are specifically there to help users with questions related to identity and access management issues.
The entire solution includes:
McAfee One Time Password, a scalable, multi-factor authentication offering that provides a one-time password to any mobile device or PC.
McAfee Cloud Single Sign On, which provides single sign on capabilities for hundreds of cloud-based applications. It's available in the On-Premise Edition and SaaS Edition, the latter of which is a cloud-based version available as a service hosted and supported by McAfee.
"There is a huge shift underway to extend enterprise-class security to cloud-based applications and services while also consolidating security onto just a few key platforms," said Pat Calhoun, senior vice president and general manager of network security at McAfee, in a prepared statement. "McAfee is not trying to 'boil the ocean,' instead we are focusing on several identity-related 'hot spots' and investing to help our customers and partners solve critical challenges and maintain business continuity and agility."
With Cloud Single Sign On, McAfee is providing hundreds of Cloud Identity connectors for automated account provisioning and de-provisioning, as well as integration with key enterprise identity repositories. As for One Time Password, it provides the benefits of multi-factor authentication without the overhead expense and management challenges of legacy hardware tokens.
The authentication can be delivered via smartphone, SMS text message, a PC client application, email, IM/chat, or a third-party token — giving customers some choice and flexibility in how they deploy the authentication technology.
About the Author
You May Also Like