McAfee Acquires Validedge Sandboxing Technology

McAfee yesterday said it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a new type of malware detection to its network and endpoint products. The first integration of sandboxing into its product line is expected in the second half of this year.

San Francisco -- A McAfee yesterday said it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a new type of malware detection to its network and endpoint products. The first integration of sandboxing into its product line is expected in the second half of this year.

[FROM THE SHOW: Hottest products at RSA Conference 2013]

Pat Calhoun, senior vice president and general manager, network security at McAfee, said the ValidEdge technology works by running code inside the safety of a sandbox so that malicious activity associated with malware can be detected in a replicated operating system without risk to the customer's network. Augmenting McAfee's current line of host and network defense products with sandboxing will provide the basis for what is being called McAfee Advanced Threat Defense.

Slideshow: 13 of the Biggest Security Myths Busted

Slideshow: 10 Shocking Security Exploits

The move by McAfee comes as competitors such as Sourcefire and FireEye have also implemented forms of sandboxing for malware defense, says Jon Oltsik, senior principal analyst at Enterprise Strategy Group.

Calhoun said some competitors have taken the approach of cloud-based use of sandboxing for malware detection but McAfee's approach with ValidEdge will be toward providing on-premises technology for sandboxing.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: emessmer@nww.com.

Read more about wide area network in Network World's Wide Area Network section.

This story, "McAfee Acquires Validedge Sandboxing Technology" was originally published by Network World.

To comment on this article and other CIO content, visit us on Facebook, LinkedIn or Twitter.
Related:
Download the CIO October 2016 Digital Magazine
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.