Top-Rated Free Essay
Preview

Mcafee Case

Good Essays
635 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mcafee Case
As a leading security technology company, Mcfee offers computer and network solutions to businesses, consumers and governments. It operated in a single segment, and hence the role of the corporate parent is primarily setting strategic goals and ease access to capital market. According to Datamonitor, its offering falls into the following product groups: endpoint security, network security and risk & compliance.

From a corporate strategy point of view, at the end of 2009, INTEL was the world’s largest semiconductor chip maker, based on revenue. Its business was to develop advanced integrated digital technology products, primarily integrated circuits (semiconductors and switches), for industries such as computing and communications. They had also started to develop platforms, which were integrated suites of digital computing technologies that work together to provide an optimized computing solution compared to components that are used separately. Their goal was to be the preeminent provider of semiconductor chips and platforms for the worldwide digital economy.

Mcafee organized its business around its major product groups:[1] • | Endpoint security. Secure corporate and consumer computer systems, including servers, desktop and laptop computers, handheld voice and data phones, and other devices that are connected to corporate systems and networks and home PCs. This group comprises system security productsand data protection products. | • | Network security. Similar to endpoint security but are tailored protect network systems, servers, laptops and other network devices as well as users and data of corporate networks of all sizes. This group encompasses enterprise-class firewall, intrusion detection and prevention, network access control, network behavior analysis, network threat response, web, e-mail and data loss prevention security appliances and solutions. The offering also includes McAfee SECURE standard, an aggregate of industry best practices, separate from the Payment Card Industry (PCI) Data Security Standard, designed to provide a level of security that an online merchant can reasonably achieve to help provide consumers with better protection when interacting with websites and shopping online. McAfee’s network solutions also available as security software-as-a-service (SaaS) offerings and includes e-mail security service and web protection service. | • | The compliance and availability solutions. The C&A solutions include change control, application control, policy auditor and PCI compliance. The solutions assess, monitor, enforce and report on customer information technology (IT) policies in order to give customers both a real-time view of their governance and compliance profiles as well as continuous control of those configurations and policies to prevent unwanted or unauthorized changes. |

From a business strategy point of view, Software and Services business division, though part of Intel’s strategy, was not the focus of the organization previously. But in 2009, they were starting to get focus due to its move towards providing platforms to the user, than just components. Its initial offering included operating systems, middleware, and tools used to develop, run, and manage a variety of enterprise, consumer, embedded, and handheld devices. It was more targeted towards increasing the appeal of the hardware to the 3rd part software developer.

As evident in the 10-K filing (2010), Intel was transforming from a company with a primary focus on the design and manufacture of semiconductor chips for PCs and servers to a computing company that delivers complete solutions in the form of hardware and software platforms and supporting services. So much so that they changed their software business division’s strategy to be centred around three pillars of computing: energy-efficient performance, connectivity, and security.

Energy efficient performance was covered by the existing product suit, Connectivity would be provided by the acquisition of Wireless Solutions (WLS) business of Infineon Technologies AG (WLS business will operate as Intel Mobile Communications and offer mobile phone components such as baseband processors, radio frequency transceivers, and power management chips) and Security will be provided by their potential acquisition of McAfee.

[1] Datamonitor – Mcafee profile

You May Also Find These Documents Helpful

  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    Managed Security which allows management of all content in and out of the network, which in effect outsources all your security to.…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    4. Network Admissions Control - Where a client (supplicant) must pass muster with the networks policy server before being able to connect to resources on the network. Internal firewalls at the host level - These can be software based (personal firewalls) or hardware based such as the 3Com embedded firewalls and policy server that are host-based, hardware-embedded firewalls for desktops, servers and notebooks. These firewalls help to protect individual systems inside or outside the perimeter, wherever an additional layer of security is needed.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mba/540 Risk Analysis

    • 862 Words
    • 4 Pages

    In the week three scenario, Silicon Arts Inc. (SAI) is a four-year old company that manufacturers digital imaging Integrated Circuits (IC 's) that are used in digital cameras, DVD players, computers, and medical and scientific instrumentations. SAI is looking to expand. The CEO of SAI (Hal Eichner) has a two point agenda for the company:…

    • 862 Words
    • 4 Pages
    Better Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    In the field of policing there are a couple different paths for an individual to choose from and they include private security and public policing. State government, city government, and towns normally provide the community with a public police force to enforce the laws and protect the citizens. Police officers are very important within a community but sometimes a private security can come in and help out and this frees up time for the public policing. Private security personnel generally work for a private company that handles their own dispatching, training and recruiting. Private security functions include loss-prevention duties or protective services that would not be handled by public policing. Private security also specializes in closed circuit monitoring services, secret level clearance, drive by patrol. Private security does not have the authority to arrest anyone either; however they can detain until law enforcement get there. Public policing officers are a function of the executive branch of government. Public officers are paid entirely from public funds that generate from grants, public sources, and revenues from taxes. Most private security organizations are paid from collecting a fee from their client. It is not uncommon for private security to go undercover like public police also, so that they can blend in the environment and be used as asset protection. The goals and training of private security and public policing are similar to each other. Private security and public policing are unique and successful in their own ways. The way that the private security and public policing organizations function and interact within each other is different; however they both function with leadership. The differences in public policing and private security would include the duties of the job. Police officers duties include responding to emergency calls, patrol public streets and monitor the…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    I can

    • 278 Words
    • 2 Pages

    2) The Windows Experience Index rates a computer’s performance on a scale of 1.0 to 7.9. Based on the rating of your computer, what can you conclude about its performance?…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this excerpt from a textbook, the author examines how Andy Grove, the CEO of a chipset venture, created an extremely strong strategy process based mainly on Intel’s core microprocessor business. Burgelman talks about how the venture succeed even though top management at Intel didn’t regard the chipsets as a business in its own right, but rather as a strategic support for microprocessors. Using data from interviews with most of the key personnel involved in the venture, this chapter describes and analyzes its development within Intel, and the steps and challenges that were taken to have it succeed.…

    • 523 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays

Related Topics