Advantech has been named a McAfee Authorized Embedded Distributor in Asia Pacific, laying the foundation to strengthen Advantech’s position as a key embedded computing and service provider in Asia Pacific.
Leading the market with innovative industrial computing products and services for over 30 years, Advantech continues to identify opportunities to bring more value-added services to their customers.
According to Miller Chang, Vice President of Embedded Computing Group, Advantech, becoming a McAfee Authorized Embedded Distributor in Asia Pacific brings the company a unique opportunity to work with McAfee and expand their hardware/software offerings.
Tom Moore, Vice President for World Wide Embedded sales at McAfee comments that Advantech brings a history of expertise in embedded platform that will benefit the growing market opportunity and drive intelligent systems’ momentum.
Providing more than just a distributing license, Advantech offers a series of value-added services including embedded solution seminars, hands-on training and software APIs and utilities. Customers can leverage Advantech’s professional embedded solution development capability to streamline their business more effectively. Along with supplying a world-leading set of tools to help build reliable embedded devices and intelligent systems, Advantech is committed to providing total solutions for all their customers.
McAfee Embedded Security products offered by Advantech:
- McAfee Integrity Control combines McAfee Embedded Control and the McAfee ePolicy OrchestratorR (McAfee ePO) console, providing integrated audit and compliance reports to help satisfy multiple compliance regulations
- McAfee Embedded Control maintains the integrity of systems by only allowing authorised code to run and only authorised changes to be made
- McAfee Application Control provides an effective way to block unauthorised applications and code fixed-function devices, with the whitelisting solution using a dynamic trust model and innovative security features to thwart advanced persistent threats without requiring signature updates or labor-intensive list management