{"id":1489,"date":"2006-05-30T00:00:00","date_gmt":"2006-05-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/30\/mcafee-reveals-onecare-competitor\/"},"modified":"2021-12-30T11:39:28","modified_gmt":"2021-12-30T11:39:28","slug":"mcafee-reveals-onecare-competitor","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/30\/mcafee-reveals-onecare-competitor\/","title":{"rendered":"McAfee Reveals &#8216;OneCare&#8217; Competitor"},"content":{"rendered":"<p>McAfee announced today an all-in-one security subscription service codenamed Falcon will contain all major security suite components as well as PC backup and tune-up tools.  It&#8217;s essentially a competitor to Microsoft&#8217;s Windows OneCare, expected soon, and Symantec&#8217;s Genesis (also a codename), due out this fall.  In fact, with a beta due out in a few weeks and an expected summer launch, McAfee may beat Symantec out of the gate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We know from our research and relationship with millions of consumers that PC security is confusing and complex to them,&#8221; said Marc Solomon, Director of Product Management, McAfee Consumer.  &#8220;With the launch of &#8216;Falcon&#8217; this summer, we have integrated into our award-winning products powerful, yet easy to use protection that addresses both existing and emerging threats.<\/p>\n<p>Falcon will work with non-Internet Explorer browsers like Firefox and has a better-designed interface with easy access to advanced options.  Other improvements: protection against rootkits, anti-phishing heuristics, detection of malware within images, scanning of USB devices such as thumb drives, home-network protection, and automated local backup.<\/p>\n<p>http:\/\/www.neowin.net\/index.php?act=view&#038;id=33349<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1489","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1489"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1489\/revisions"}],"predecessor-version":[{"id":3976,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1489\/revisions\/3976"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}