Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

McAfee Announces Security Solutions to Assist Governments Move to the Cloud

8/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtuvntcvndu1l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

McAfee, part of Intel Security and a leading provider of comprehensive security solutions to the U.S. federal government, today announced it will offer its Host-Based Security Solution (HBSS) to Amazon Web Services’ (AWS) federal government cloud customers. HBSS, a security architecture deployed throughout the Department of Defense (DoD), will be the first in a series of McAfee Software as a Service (SaaS) offerings enabled by InfoReliance, the company that is assisting with McAfee’s migration of existing tools and products to the AWS Cloud.

The U.S. military and other government organizations are increasingly turning to cloud computing to increase mission interoperability, preserve resources and reduce costs. To ensure a standardized approach to cloud transition across the DoD environment, the Defense Information Systems Agency (DISA) requires that all cloud service providers adhere to the DISA Cloud Security Model, or CSM. Recently, the AWS GovCloud (US) Region became the first-ever cloud service to receive a Provisional Authorization from the DoD for CSM levels 1-5.

Already implemented on over five million DoD systems, HBSS is a suite of McAfee commercial-off-the-shelf software that helps detect, monitor and mitigate threats to the DoD network and systems. The new HBSS SaaS offering for AWS will enable the DoD and intelligence community to extend their existing security architecture, migrate their mission applications, further secure their data and meet their information assurance mandates.

“Our DoD customers said they wanted to transition to the cloud and we listened,” said Ken Kartsen, Vice President of Federal at McAfee. “We’re embracing cloud through strategic investments across our portfolio of network and endpoint cybersecurity technologies so they will be interoperable with AWS. We wanted to lead with a cloud offering for HBSS as it is so critical to the security of DoD systems.”

“It is important for DoD customers to be able to quickly and easily migrate to the cloud while meeting their mandated security requirements,” said Teresa Carlson, Vice President of Worldwide Public Sector, Amazon Web Services, Inc. “This shared security solution provides additional layers of security to help DoD customers to securely manage resources in the cloud while reducing costs.”

This article has been extracted from http://www.heraldonline.com/, please click on this link to read the article in full http://www.heraldonline.com/2014/09/08/6299770_mcafee-announces-security-solutions.html?sp=/100/773/385/&rh=1

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...