2 min read

McAfee inks security partnership with power vendor

Security

A partnership deal between security vendor McAfee, now Intel Security, and Schneider Electric, formerly APC, may enable solution providers to resell security along with power and cooling products.

The new partnership was announced today as a whitelisting arrangement whereby McAfee provides cybersecurity solutions for the utility and critical infrastructure market through Schneider Electric. This collaboration will enable Schneider Electric customers to add tested and certified application whitelisting capabilities in the management of core offerings of water, oil & gas, electric networks and transportation infrastructures.

The thought here is that these customers may be able to reduce ownership costs without significantly impacting the performance of critical solutions, according to Schneider Electric.

The partnership with McAfee will also allow Schneider Electric to combine whitelisting capabilities and change control technology to ensure that only trusted applications run on critical infrastructure systems. This includes being able to monitor and manage changes to mitigate malicious or accidental system modifications, preventing execution of unauthorized code and many common malware on their systems. These capabilities protect critical systems from zero-day attacks, reduce in-field breakage, and keep systems and devices compliant with security standards through patch cycles.

Cyril Perducat, senior vice president software and digital services transformation, global solutions at Schneider Electric, said the expansion of the security offering to incorporate McAfee whitelisting capabilities enables Schneider Electric to offer a more modern and secure critical infrastructure environment.

Tom Moore, vice president of worldwide embedded security at McAfee, said that by combining expertise and technology innovations from both Schneider Electric and McAfee will enhance the cybersecurity posture of critical infrastructure customers by providing whitelisting and ensuring that only approved applications will run, preventing unauthorized changes and access.

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment