Security and Management for Mobile Devices, Data, and Applications
McAfee Enterprise Mobility Management (McAfee EMM) manages and secures the mobile workforce. McAfee EMM delivers a simplified, streamlined way to enable productivity with confidence in a world where users, and their devices, go everywhere and anywhere.
Comprehensive Mobile Security
Mobile productivity presents risks to mobile devices and data, including malware, loss, theft, and unauthorized access. Businesses work hard to develop their intellectual property, partner and customer lists, and trade secrets so it’s a top priority to protect that mobile data. This is achieved through policy-based security, including malware and app protection, that’s easy to use and manage.
Support for Bring Your Own Device (BYOD)
Employee device choice can reduce costs, however it adds complication for IT. When an employee-owned, consumer-oriented device is used for business, additional privacy, control, usage, policy, security, and data protection issues need to be addressed to ensure that business data is protected.
Single Pane of Glass for Managing and Securing All Endpoints
McAfee EMM is fully managed by McAfee ePolicy Orchestrator (McAfee ePO) management software. McAfee EMM and McAfee ePO software enable enterprises to manage and secure mobile users and devices right alongside traditional endpoints like laptops, workstations, and servers, using the same familiar console and infrastructure.
The McAfee EMM solution delivers mobile data protection and mobile device management (MDM) through a combination of McAfee EMM, McAfee Secure Container for Android, McAfee VirusScan Mobile for Android, and McAfee ePolicy Orchestrator (McAfee ePO) management.
McAfee EMM delivers confidence that users, data, apps, and devices are secure:
McAfee EMM helps you to embrace BYOD by providing security, while enabling the native experience that users demand.
McAfee EMM requires just one console to manage and secure PCs, laptops, servers, and mobile devices.
McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.
The healthcare system uses McAfee solutions to gain compliance with HIPAA, PCI, DSS, and FTC regulations.
Morpho chose McAfee Enterprise Mobility Management software to apply the same levels of security and control to mobile devices that it provides on laptops and desktops.
NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.
Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.
McAfee helped Watsons deploy the McAfee Enterprise Mobility Management solution. This solution enables employees to decide on their choice of mobile devices while still able to access corporate applications securely and conveniently.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Get answers to questions about McAfee Enterprise Mobility Management.
Learn how to keep apprised of the current attacks being used against mobile devices and pay attention to both the process and the technologies used to protect them.
Mobile devices are dramatically changing the way businesses, IT departments, and employees work. While businesses want to embrace the opportunities presented by mobile productivity, it’s critical to minimize the significant additional risks, exposures, and disruptions.
Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.
Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
Learn how to bring mobile devices into the security infrastructure through integration with key security technologies.
Allowing employees to use their personal mobile devices for work creates a number of risks. In this editorial brief, Jules Polonetsky, director of the Future of Privacy Forum, discusses managing these risks by balancing employee privacy concerns with security initiatives.
This white paper examines the five areas IT should address when mobilizing business applications, and looks at how McAfee secure mobility solutions meet those requirements.
Tinder is a kind of modern day ‘Hot or Not’ mobile dating app. It finds matches based on location, then lets you scroll through pictures (no lengthy profiles here), picking those that catch your eye – and vetoing the ones that don’t. The app works by accessing users’ Facebook accounts to pull pictures and other […]
From kidnapping family photos, to risky new apps and a teen jailed for a Facebook post, the conversation on family safety online is cooking this month. Here’s a wrap up of several stories. Also, we’ve covered the Heartbleed virus extensively on this blog lately. Please do not forget to change your passwords (and have […]
The post Family Safety Wrap: 5 Headlines You May Have Missed appeared first on McAfee.
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using the OpenSSL encryption protocol to protect usernames, passwords, credit and debit card numbers, and other sensitive information. Whether hackers have previously been taking advantage of this bug is still unknown, but now is the time […]
The post What Mobile Users Should Know About Heartbleed: Free McAfee Android App appeared first on McAfee.
Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a. Perkele) to trick users into installing the malware. These apps steal incoming SMS messages that could contain mTANs (Mobile Transaction Authentication Numbers) used as two-factor authentication to allow Internet transactions. Now, however, it seems that […]
The post iBanking Mobile Trojan Poses as Facebook Token Generator appeared first on McAfee.
One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field day with your discarded pre-approved credit card applications, bank statements, etc. Using a paper shredder before throwing out letters and documents […]
The post This Earth Day, “Clean” Your Device Before You Recycle It appeared first on McAfee.