The devil is in the DeepSAFE detail

McAfee announced its first DeepSAFE product this week, but will IT departments be interested in the sub-OS model?

Processor

It would be horrifically expensive, one admin told me, and convincing the board of the value of such an investment would be impossible he added. Part of the reason for this can be summed up in a McAfee sound bite from the FOCUS 2011 announcement: "McAfee Deep Defender is capable of detecting nearly all kernel-mode malware." Nearly all is not a great selling point in security terms. It's a bit like trying to flog an underwater camera that is 99 per cent waterproof.

It all but suggests, nay announces, not all kernel-mode malware can be detected by the product, does it not? In which case, where is the real value? And that's before the bad guys, who might not have quite the financial clout of Intel but seem to do pretty well in keeping one step ahead of the information security marketplace as a rule nonetheless, catch up and manage to work out how to cloak their malware from DeepSAFE eyes.

I suspect it will not be too long before that happens, and then we are back to square one. No wonder savvy enterprises are going to play a waiting game here, seeing how the rest of the security industry (on both sides of the legal fence) respond to these developments in terms of competing products coming to market.

In the meantime, the average enterprise would probably be best advised to invest in education and getting the basics right when it comes to security. Not least the small matter of keeping everything patched and up to date, and not allowing untrusted software and devices to access the network.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Most Popular

46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
Huawei Mate 40 Pro 5G review: A tragically brilliant Mate
Mobile Phones

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate

26 Nov 2020