McAfee Enterprise Mobility Management (McAfee EMM)

McAfee Enterprise Mobility Management (McAfee EMM)

Secure, easy, and scalable enterprise mobility

Next Steps:

Overview

Security and Management for Mobile Devices, Data, and Applications
McAfee Enterprise Mobility Management (McAfee EMM) manages and secures the mobile workforce. McAfee EMM delivers a simplified, streamlined way to enable productivity with confidence in a world where users, and their devices, go everywhere and anywhere.

Comprehensive Mobile Security
Mobile productivity presents risks to mobile devices and data, including malware, loss, theft, and unauthorized access. Businesses work hard to develop their intellectual property, partner and customer lists, and trade secrets so it’s a top priority to protect that mobile data. This is achieved through policy-based security, including malware and app protection, that’s easy to use and manage.

Support for Bring Your Own Device (BYOD)
Employee device choice can reduce costs, however it adds complication for IT. When an employee-owned, consumer-oriented device is used for business, additional privacy, control, usage, policy, security, and data protection issues need to be addressed to ensure that business data is protected.

Single Pane of Glass for Managing and Securing All Endpoints
McAfee EMM is fully managed by McAfee ePolicy Orchestrator (McAfee ePO) management software. McAfee EMM and McAfee ePO software enable enterprises to manage and secure mobile users and devices right alongside traditional endpoints like laptops, workstations, and servers, using the same familiar console and infrastructure.

EMM Wins Gold Medal: Best Mobile Data Security 2013

Features & Benefits

Security and Management for Mobile Devices, Data, and Applications

The McAfee EMM solution delivers mobile data protection and mobile device management (MDM) through a combination of McAfee EMM, McAfee Secure Container for Android, McAfee VirusScan Mobile for Android, and McAfee ePolicy Orchestrator (McAfee ePO) management.

Security

McAfee EMM delivers confidence that users, data, apps, and devices are secure:

  • Enforce the use of VirusScan Mobile Security for Android and block devices with malware to protect the network from malicious software.
  • Ensure apps are secure with mobile app reputation.
  • Block devices that have malware, are jailbroken or rooted, or have blacklisted apps.
  • Enforce authentication and encryption.
  • Network connectivity management, including certificate-based two-factor authentication for VPN and Wi-Fi on iOS devices.
  • Mobile threat events alert administrators to devices that are jailbroken or rooted, or have malware, potentially malicious apps, or blacklisted apps for enhanced situational awareness.
  • Pre-authorization of users.
  • Remote locking, wiping corporate data, or full wiping of devices that are lost or stolen.
  • Secure Container for Android provides encrypted storage and restricts cut and paste of data, keeping it out of unsecured areas.
BYOD

McAfee EMM helps you to embrace BYOD by providing security, while enabling the native experience that users demand.

  • Users can enjoy the native email on iOS but IT can govern which apps can be used to open corporate email attachments and block the copying, forwarding, or replying to corporate email using other apps.
  • Risky Android devices can be secured centrally via managed anti-malware, app reputation, and a Secure Container for encrypted email, contacts, and calendar, secure document viewing, and cut and paste restrictions.
  • Remote wipe of only corporate data can be executed for iOS and Android devices leaving personal data untouched.
  • Easy, over-the-air provisioning and policy distribution.
  • Support for the most-used consumer devices, including Android, iOS, and Windows Phone.
Single Pane of Glass for Mobile and Endpoint Management and Security

McAfee EMM requires just one console to manage and secure PCs, laptops, servers, and mobile devices.

  • Now, McAfee ePO software can be used to manage iOS, Android, and Windows Phone devices right alongside traditional endpoints, giving IT security, administration, and helpdesk staff a familiar console to secure and manage users regardless of the type of device.
  • McAfee EMM is included in the McAfee Complete Endpoint Protection suites, easing budget concerns as IT departments seek to enable mobility in the workforce.
  • Granular mobile policy options, including by user, group, device, and operating system.
  • Mobile dashboards and actionable reports and alerts can be rolled up with events from the broader endpoint inventory for enhanced situational awareness and remediation.
  • McAfee EMM provides for the distribution of commercial and enterprise apps for iOS and Android devices.
  • End-user notifications tell users how to remediate compliance events, reducing IT helpdesk calls.
  • Secure Container for Android provides a single email client across a range of devices to make the helpdesk job easier.

Device and System Requirements

EMM Device Agents

  • Supported Mobile Operating Systems
    • Apple iOS 5.0 or higher
    • Windows Phone 7 and 8 (No EMM Agent required)
    • Android 2.3 and higher

EMM Server Components

  • Software
    • McAfee ePolicy Orchestrator 4.6.7 or higher
  • Hardware
    • 4 GB RAM (physical or virtual), Dual Core CPU
  • Operating System
    • Microsoft Windows Sever 2008 64-bit with Service Pack 2 (SP2) (Standard or Enterprise Edition)
    • Windows Server 2008 R2 64-bit with SP 1 (Standard or Enterprise Edition)
    • Windows Server 2012 64-bit (Standard Edition)
    • Windows Server 2012 R2 64-bit (Standard Edition)
  • SQL Server
    • 2008 R2 32- and 64-bit with the latest Server Pack (Enterprise, Standard, or Workgroup Edition)
    • 2012 64-bit with the latest Server Pack (Enterprise Edition)
      • Configuration and Limitations
        • Database collation must be configured to the U.S. English default: SQL_Latin1_General_Cp1_CI_AS
        • SQL Express is appropriate only for trial installations, with a single, on-premises server used in non-production environments
  • Mail Server
    • Exchange 2007, 2010, or 2013
    • Domino 8.5.3 or 9.0
  • Internet Browsers
    • Internet Explorer 10.0 or higher
    • Firefox 10.0 or higher
    • Chrome 17 or higher
  • CA server (PKI environments)
    • Windows Server 2008 R2 64-bit with Service Pack 1 or later (Standard or Enterprise Edition), with Simple Certificate Enrollment Protocol (SCEP) enabled

Awards

McAfee Enterprise Mobility Management wins Gold Medal for Best of Mobile Data Security 2013

McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.

Customer Stories

Bank Central Asia

Bank Central Asia achieves compliance and saves time with McAfee ePO Software.

Highlights
  • Eased compliance with internal and industry regulations
  • Saved time through centralized management
  • Provided protection to computers, network, and data through integrated solutions

Major Healthcare System

The healthcare system uses McAfee solutions to gain compliance with HIPAA, PCI, DSS, and FTC regulations.

Highlights
  • Optimize mobility management of corporate data
  • Protect corporate data from the data center to the mobile device
  • Set mobile policies that work while providing flexibility to users
  • Provide central dashboard for controlling entire security environment

Morpho

Morpho chose McAfee Enterprise Mobility Management software to apply the same levels of security and control to mobile devices that it provides on laptops and desktops.

Highlights
  • Email encryption, password access, and application control prevents unauthorized access to sensitive data
  • Mobile security provides significant time and cost savings through employee self-provisioning
  • Centralized management allows for comprehensive control and reporting
  • Extensive security empowers field technicians to do their jobs

NYC Department of IT and Telecommunications

NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.

Highlights
  • Increased protection with a savings of $18 million
  • Provided centralized control across highly distributed IT environment

Riverside Healthcare

Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.

Highlights
  • Optimize mobility management of corporate data
  • Protect corporate data from the data center to the mobile device
  • Set mobile policies that work while providing flexibility to users

Watsons

McAfee helped Watsons deploy the McAfee Enterprise Mobility Management solution. This solution enables employees to decide on their choice of mobile devices while still able to access corporate applications securely and conveniently.

Highlights
  • Reduced the security risks posed by mobile devices at work

Highlights

Resources

Data Sheets

McAfee Enterprise Mobility Management

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

McAfee Enterprise Mobility Management (McAfee EMM) 12.0

Get answers to questions about McAfee Enterprise Mobility Management.

Reports

Surviving the iPocalypse: Mobile Device Security

Learn how to keep apprised of the current attacks being used against mobile devices and pay attention to both the process and the technologies used to protect them.

Solution Briefs

Smarter BYOD

As Gartner predicts, BYOD is here to stay and will soon become the rule rather than the exception. Users are eager to embrace the trend, but IT is reticent for good reason. This solution brief shows IT how to successfully get a handle on BYOD with a scalable strategy and integrated solutions that fall under the umbrella of the Security Connected framework from McAfee.

Securing the Mobile Enterprise

Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.

Say Yes to Mobile Devices

Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure

Learn how to bring mobile devices into the security infrastructure through integration with key security technologies.

Employee Use of Personal Devices

Allowing employees to use their personal mobile devices for work creates a number of risks. In this editorial brief, Jules Polonetsky, director of the Future of Privacy Forum, discusses managing these risks by balancing employee privacy concerns with security initiatives.

White Papers

Mobilizing Business Applications with McAfee

This white paper examines the five areas IT should address when mobilizing business applications, and looks at how McAfee secure mobility solutions meet those requirements.

A Guide to Deploying Application-Enabled Smartphones in the Enterprise (Dutch)

This white paper, authored by J. Gold Associates, outlines a strategy for rolling out smartphones in the enterprise.

Community

Blogs

  • Understanding The Ever-Changing Security Landscape
    Ryan Allphin - July 8, 2014

    Since starting my career at McAfee in 2002, I have seen so many changes within the company and the security industry at large. New technologies have transformed the relationship between enterprises, their employees, and their critical systems—for better or for worse. And in my role overseeing McAfee’s Security Management business, I have had the opportunity […]

    The post Understanding The Ever-Changing Security Landscape appeared first on McAfee.

  • Mobile Apps: The Next Frontier for Hackers
    Lianne Caetano - July 8, 2014

    By the end of 2014, there will be more than two billion smartphones and tablets in use across the world. That’s two billion more opportunities for hackers to get a hold of valuable user data. As mobile devices have progressed, so has cybercrime, especially when it comes to taking advantage of apps that we use […]

    The post Mobile Apps: The Next Frontier for Hackers appeared first on McAfee.

  • What is an Advanced Persistent Threat?
    Robert Siciliano - June 30, 2014

    If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an advanced persistent threat (APT). This term usually refers to an attack carried out by a group that targets a specific entity using malware and other sophisticated techniques to exploit […]

    The post What is an Advanced Persistent Threat? appeared first on McAfee.

  • Watch Out For Malicious Mobile App Doppelgangers
    Lianne Caetano - June 24, 2014

    As we usher in yet another worldwide sporting event this month with the World Cup, it’s inevitable that scammers will piggyback on the myriad of opportunities at their fingertips to swipe, nab, and phish for spectators’ personal data. We’ve seen it happen a million times before and trending news has always been easy fodder for […]

    The post Watch Out For Malicious Mobile App Doppelgangers appeared first on McAfee.

  • What is Wardriving?
    Robert Siciliano - June 23, 2014

    Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere—home, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to capture all data we type into our connected computers and […]

    The post What is Wardriving? appeared first on McAfee.