Security and Management for Mobile Devices, Data, and Applications
McAfee Enterprise Mobility Management (McAfee EMM) enables businesses to empower their work force with mobile productivity in a secure, simplified, streamlined way.
Mobile productivity presents risks to mobile devices and data, including loss, theft, and unauthorized access. Businesses work hard to develop their intellectual property, partner and customer lists, and trade secrets so it’s a top priority to protect that mobile data through policy-based security that’s easy to use and manage.
The increasingly popular bring-your-own-device (BYOD) trend gives employee device choice yet adds complication for IT. When an employee-owned, consumer-oriented device is used for business, additional privacy, control, usage, policy, security, and data protection issues need to be addressed to ensure that business data is protected.
Busy IT departments will appreciate being able to orchestrate policy, configuration, security, and management of mobile devices through a web-based console. The integrated McAfee ePolicy Orchestrator (McAfee ePO) management infrastructure provides a robust platform.
Unified, Enterprise-Wide Management
It makes sense to manage mobile devices along with your traditional endpoints such as laptop PCs using a single unified infrastructure and console. After all, it’s the same data, same people, same permissions, and similar IT processes. It is easy to manage all endpoints with the integrated McAfee ePO management infrastructure.
The McAfee EMM solution delivers mobile data protection and mobile device management (MDM) through a combination of McAfee EMM, McAfee Secure Container for Android, McAfee VirusScan Mobile for Android (unmanaged), and McAfee ePolicy Orchestrator (McAfee ePO) management.
Striking the right balance between security, usability, and manageability is essential. McAfee EMM provides just the right amount of security through:
Although business benefits from on-the-go productivity, mobile workers are often unaware of the additional business risks and complications that BYOD brings. So, businesses need to make it easy to keep data secure on employee-owned devices through features such as:
Mobile device management can be complicated so mobile-specific features and views help IT departments maintain control through:
Unified management provides a comprehensive approach to enterprise-wide risk management with:
McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.
The healthcare system uses McAfee solutions to gain compliance with HIPAA, PCI, DSS, and FTC regulations.
Morpho chose McAfee Enterprise Mobility Management software to apply the same levels of security and control to mobile devices that it provides on laptops and desktops.
NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.
Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.
McAfee helped Watsons deploy the McAfee Enterprise Mobility Management solution. This solution enables employees to decide on their choice of mobile devices while still able to access corporate applications securely and conveniently.
Topics : Endpoint Protection, Mobile Security, Security Management
Topics : Endpoint Protection
For a technical summary on the McAfee product listed above, please view the product data sheet.
Get answers to questions about McAfee Enterprise Mobility Management.
McAfee Labs examines the current state of smartphones and other mobile devices and the security risks associated with their new capabilities.
Learn how the wide adoption of smartphones and tablets in the workforce have changed IT requirements.
This study attempts to objectively determine how many employees lose or have their smartphones stolen and the consequences to the organization, and offers recommendations on how organizations can mitigate or lessen the risk of smartphone loss or theft.
Learn how an effective mobile strategy must balance security, manageability, and end-user concerns.
Learn how to keep apprised of the current attacks being used against mobile devices and pay attention to both the process and the technologies used to protect them.
Mobile devices are dramatically changing the way businesses, IT departments, and employees work. While businesses want to embrace the opportunities presented by mobile productivity, it’s critical to minimize the significant additional risks, exposures, and disruptions.
Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.
Inspire student learning and engagement while preventing technology misuse through filtered and monitored access to the Internet on school-owned devices. This solution also works for highly controlled business environments too.
Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Learn how to bring mobile devices into the security infrastructure through integration with key security technologies.
McAfee Enterprise Mobility Management (McAfee EMM) performs an automatic, real-time compliance check before allowing devices to access the corporate network, ensuring that required policies and configuration profiles are present and persistent at each connection.
Allowing employees to use their personal mobile devices for work creates a number of risks. In this editorial brief, Jules Polonetsky, director of the Future of Privacy Forum, discusses managing these risks by balancing employee privacy concerns with security initiatives.
Learn the differences between the McAfee Enterprise Mobility Management (McAfee EMM) solution and the Apple iPhone Configuration Utility.
Learn how McAfee Enterprise Mobility Management provides mobile device lifecycle management.
This white paper examines the five areas IT should address when mobilizing business applications, and looks at how McAfee secure mobility solutions meet those requirements.
As a supplement to the latest McAfee Labs Threats Report, published this week, we offer this timeline of leading threats that made news in the fourth quarter of 2013. October 3: Adobe reports personal information relating to customer orders has been accessed in an attack on the company’s systems. The total amounts to 152 […]
With the prevalence of mobile devices, more than ever, it’s easy for us to share our lives with the world. And yes, social networks are all about staying in touch with friends and family, and sharing events in your life, but perhaps it’s too easy to share information? With just a few clicks, posts and […]
Every year brings with it a new app craze. 2011 was the year of Angry Birds; 2012 was the year of Temple Run; 2013 was the year of Candy Crush—and 2014 is definitely on track to be the year of Flappy Bird. Flappy Bird was initially released in May of 2013, but really only gained […]
Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind when developing this new approach: Focusing on a few key topics and trends. Those topics will cover top threats or security issues from the quarter; […]
The post Welcome to the New McAfee Labs Quarterly Threats Report appeared first on McAfee.
Things have come to an end at Mobile World Congress 2014, where industry experts gathered to talk all things mobile and security. We had a great time discussing the future of mobile trends and how they will affect consumers and the enterprise, as well as sharing some exciting new ways we aim to help protect […]