Skip navigation

This blueprint showcases how McAfee and Intel have teamed up to stop the most insidious malware tools cyber criminals are using today - rootkits.  Rootkits are designed to hide from the user, the OS or applications and cyber criminals are using them to propagate malware that evades traditional security measures.

McAfee Deep Defender uses Intel Virtualization Technology (VT-x) to get a new perspective on security by operating outside of the OS.  This solution, combined with McAfee DeepSAFE technology monitors kernel memory for malicious kernel rootkits and can prevent them from installing, stopping their cloaking capabilities and the malware they attempt to hide and propagate.

McAfee® ePolicy Orchestrator™ Deep Command™ employs Intel® vPro® Active Management Technology for automated, beyond the operating system management.  ePO Deep Command helps organizations using Intel® vPro® to get more value out of the features of Intel® vPro® by allowing access to PCs whehter powered off or disabled.


This animation will show how this offers benefits IT to help reduce operational costs, enhancing security and compliance and enabling “green’” practices for idle PCs.


Click here to view the animation:


Check out this blog on McAfee's site about the new features in the latest version of ePO Deep Command: Get The Most Out Of Your Intel vPro-based PCs With McAfee ePO Deep Command

We cannot go back to a world without computing any more than we can go back to a world without electricity.  Making computing secure is essential to live up to all that computing has to offer.  Intel and McAfee delivers a new level of hardware-enhanced security that provides unprecedented protection for a safer, more worry-free computing experience from the device to the cloud


See the Intel with McAfee sales brief to see the real benefits of how we are delivering a new level of security by combining hardware with software for unprecedented protection and a safer, more worry-free computing experience across clients, data center, and the cloud.


Intel and McAfee 2012 Security Benefits: Sales Brief

We cannot go back to a world without computing any more than we can go back to a world without electricity.  Making computing secure is essential to live up to all that computing has to offer.  Intel and McAfee delivers a new level of hardware-enhanced security that provides unprecedented protection for a safer, more worry-free computing experience from the device to the cloud.


Our combined co-engineering efforts are helping to transform the security industry by focusing on implementing a new security approach to help address an escalating threat landscape more effectively.  It is critical that we go deep at providing security within the entire computing stack; we go wide to secure all the devices across the compute continuum. 


Check out these videos to see why and how McAfee and Intel is providing hardware-enhanced security.


Two of the biggest threats to your data are malware attacks and lost or stolen PCs.  Sometimes despite your best software only securityy measures your PCs and data can be put at risk, which is why Intel and McAfee have developed a multi-layered approach to protect against threats and data thefts.  This comprehensive strategy combines innovative tamper-resistent hardware with leading edge software protection to deliver advanced threat prevention, automated detection, advanced data protection and rapid remediation. In this video, you will learn how innovativeIntel® vPro™ based hardware features combined with McAfee software can provide hardware enhanced protection.


McAfee and Intel are working to transform the security industry by combining the power of hardware and software to create more sophisticated ways to help prevent attacks and better protect every segment across the compute continuum. The combination of McAfee and Intel brings fresh innovation to secure the future of computing and the Internet.


Today's threat landscape requires a deeper level of security to protect and stop the advanced threats that are being created on a daily basis.  From industrial based attacks to hackavism to embedded based threats, you must be vigilant in deploying a security strategy that is broad and comprehensive.  Check out these updated whitepapers describing the need for a deeper level of security to protect against these advanced threats.


You might have heard of McAfee ePO Deep Command and how it enables McAfee customers using Intel vPro based PCs to manage security remotely at the hardware level.  Utilizing Intel vPro Active Management (AMT) to take control or access vPro based PCs will enable customers to more efficiently and cost effectively manage security on PCs in their environment. 


This in-depth video examineshow McAfee ePO Deep Command uses the Intel vPro technology to provide security management beyond the OS.  This video will drill into the popular use cases of McAfee ePO Deep Command, such as deploying security ahead of an attack, remote remediation and wake and patch.

DC Video.jpg

Using Intel’s Active Management Technology for remote support and reliable security updates

This is a guest post from Ed Metcalf at McAfee


You are not scanning your enterprise for malware often enough. Nobody is. Informal polls of customers and security professionals show that “Wednesday at noon” is the typical schedule for a full virus scan. The explanation for this timing boils down to “people are usually in the office on Wednesday and eating lunch around noon.” Some outlier responses are “at night” or “every day at noon.”


Why aren’t more people scanning at night? Because IT finds users are shutting desktop systems down, so the scans cannot take place.


Why is “every day” not an acceptable practice? Performance. Users complain when they feel their systems are affected by security products. Oddly enough, they don’t complain when their computers are slow due to 18 open web browser windows, but that’s part of the challenge you face managing operational security.


Another sticky issue that IT operations have to deal with involves resolution of end-user issues. Anyone who has spent any amount of time trying to troubleshoot a problem over the phone knows how much more difficult it is than being physically at the device. Remote access applications offer some utility, but with major limitations:


  • Connectivity
  • Misconfiguration
  • No help during a reboot loop


All of these limitations can be overcome with the appropriate systems management technology.  While waking systems to scan and providing remote repair capabilities seem like very different issues, they are both solved through McAfee integration with Intel® Active Management Technology (Intel®AMT). Leveraging the McAfee® ePolicy Orchestrator® (McAfee ePO™) agent and centralized management environment, McAfee ePO Deep Command™ runs on desktops and laptops with the third generation Intel Core™ i5 and i7 vPro technologies.


Intel AMT is a component of Intel vPro technology available on business laptops and desktops.  It provides a secure method for businesses to monitor, maintain, update, and repair PCs without direct hands-on contact.


The third generation Intel vPro technology gives administrators complete remote control over the power state of a system. Or the ability to remotely redirect the boot sequence of a system to a networked image.  McAfee ePO Deep Command allows IT and security operations to take the features available in Intel AMT and deploy them into the enterprise.


Intel AMT is a great tool, but needs a management infrastructure to make it beneficial to enterprises.  Managing tens of thousands of systems from one central location is a McAfee ePO strength. Bringing Intel AMT management into McAfee ePO provides a way for organizations to take full advantage of the tools provided by Intel in the vPro chipset. Click here to get more information on Intel’s 3rd generation Intel vPro technology or McAfee’s ePO Deep Command.

Filter Blog

By date: By tag: