McAfee Enterprise Mobility Management (McAfee EMM)

McAfee Enterprise Mobility Management (McAfee EMM)

Secure, easy, and scalable enterprise mobility

Next Steps:

Overview

Security and Management for Mobile Devices, Data, and Applications
McAfee Enterprise Mobility Management (McAfee EMM) manages and secures the mobile workforce. McAfee EMM delivers a simplified, streamlined way to enable productivity with confidence in a world where users, and their devices, go everywhere and anywhere.

Comprehensive Mobile Security
Mobile productivity presents risks to mobile devices and data, including malware, loss, theft, and unauthorized access. Businesses work hard to develop their intellectual property, partner and customer lists, and trade secrets so it’s a top priority to protect that mobile data. This is achieved through policy-based security, including malware and app protection, that’s easy to use and manage.

Support for Bring Your Own Device (BYOD)
Employee device choice can reduce costs, however it adds complication for IT. When an employee-owned, consumer-oriented device is used for business, additional privacy, control, usage, policy, security, and data protection issues need to be addressed to ensure that business data is protected.

Single Pane of Glass for Managing and Securing All Endpoints
McAfee EMM is fully managed by McAfee ePolicy Orchestrator (McAfee ePO) management software. McAfee EMM and McAfee ePO software enable enterprises to manage and secure mobile users and devices right alongside traditional endpoints like laptops, workstations, and servers, using the same familiar console and infrastructure.

McAfee went for the gold and got it. Best mobile data security.

Learn More

Features & Benefits

Security and Management for Mobile Devices, Data, and Applications

The McAfee EMM solution delivers mobile data protection and mobile device management (MDM) through a combination of McAfee EMM, McAfee Secure Container for Android, McAfee VirusScan Mobile for Android, and McAfee ePolicy Orchestrator (McAfee ePO) management.

Security

McAfee EMM delivers confidence that users, data, apps, and devices are secure:

  • Enforce the use of VirusScan Mobile Security for Android and block devices with malware to protect the network from malicious software.
  • Ensure apps are secure with mobile app reputation.
  • Block devices that have malware, are jailbroken or rooted, or have blacklisted apps.
  • Enforce authentication and encryption.
  • Network connectivity management, including certificate-based two-factor authentication for VPN and Wi-Fi on iOS devices.
  • Mobile threat events alert administrators to devices that are jailbroken or rooted, or have malware, potentially malicious apps, or blacklisted apps for enhanced situational awareness.
  • Pre-authorization of users.
  • Remote locking, wiping corporate data, or full wiping of devices that are lost or stolen.
  • Secure Container for Android provides encrypted storage and restricts cut and paste of data, keeping it out of unsecured areas.
BYOD

McAfee EMM helps you to embrace BYOD by providing security, while enabling the native experience that users demand.

  • Users can enjoy the native email on iOS but IT can govern which apps can be used to open corporate email attachments and block the copying, forwarding, or replying to corporate email using other apps.
  • Risky Android devices can be secured centrally via managed anti-malware, app reputation, and a Secure Container for encrypted email, contacts, and calendar, secure document viewing, and cut and paste restrictions.
  • Remote wipe of only corporate data can be executed for iOS and Android devices leaving personal data untouched.
  • Easy, over-the-air provisioning and policy distribution.
  • Support for the most-used consumer devices, including Android, iOS, and Windows Phone.
Single Pane of Glass for Mobile and Endpoint Management and Security

McAfee EMM requires just one console to manage and secure PCs, laptops, servers, and mobile devices.

  • Now, McAfee ePO software can be used to manage iOS, Android, and Windows Phone devices right alongside traditional endpoints, giving IT security, administration, and helpdesk staff a familiar console to secure and manage users regardless of the type of device.
  • McAfee EMM is included in the McAfee Complete Endpoint Protection suites, easing budget concerns as IT departments seek to enable mobility in the workforce.
  • Granular mobile policy options, including by user, group, device, and operating system.
  • Mobile dashboards and actionable reports and alerts can be rolled up with events from the broader endpoint inventory for enhanced situational awareness and remediation.
  • McAfee EMM provides for the distribution of commercial and enterprise apps for iOS and Android devices.
  • End-user notifications tell users how to remediate compliance events, reducing IT helpdesk calls.
  • Secure Container for Android provides a single email client across a range of devices to make the helpdesk job easier.

Device and System Requirements

EMM Device Agents

  • Supported Mobile Operating Systems
    • Apple iOS 5.0 or higher
    • Windows Phone 7 and 8 (No EMM Agent required)
    • Android 2.3 and higher

EMM Server Components

  • Software
    • McAfee ePolicy Orchestrator 4.6.7 or higher
  • Hardware
    • 4 GB RAM (physical or virtual), Dual Core CPU
  • Operating System
    • Microsoft Windows Sever 2008 64-bit with Service Pack 2 (SP2) (Standard or Enterprise Edition)
    • Windows Server 2008 R2 64-bit with SP 1 (Standard or Enterprise Edition)
    • Windows Server 2012 64-bit (Standard Edition)
    • Windows Server 2012 R2 64-bit (Standard Edition)
  • SQL Server
    • 2008 R2 32- and 64-bit with the latest Server Pack (Enterprise, Standard, or Workgroup Edition)
    • 2012 64-bit with the latest Server Pack (Enterprise Edition)
      • Configuration and Limitations
        • Database collation must be configured to the U.S. English default: SQL_Latin1_General_Cp1_CI_AS
        • SQL Express is appropriate only for trial installations, with a single, on-premises server used in non-production environments
  • Mail Server
    • Exchange 2007, 2010, or 2013
    • Domino 8.5.3 or 9.0
  • Internet Browsers
    • Internet Explorer 10.0 or higher
    • Firefox 10.0 or higher
    • Chrome 17 or higher
  • CA server (PKI environments)
    • Windows Server 2008 R2 64-bit with Service Pack 1 or later (Standard or Enterprise Edition), with Simple Certificate Enrollment Protocol (SCEP) enabled

Awards

McAfee Enterprise Mobility Management wins Gold Medal for Best of Mobile Data Security 2013

McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.

Customer Stories

Bank Central Asia

Bank Central Asia implemented McAfee solutions to protect its network, data, and 20,000 endpoints.

Highlights
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

Morpho

Morpho chose McAfee Enterprise Mobility Management software to apply the same levels of security and control to mobile devices that it provides on laptops and desktops.

Highlights
  • Email encryption, password access, and application control prevents unauthorized access to sensitive data
  • Mobile security provides significant time and cost savings through employee self-provisioning
  • Centralized management allows for comprehensive control and reporting
  • Extensive security empowers field technicians to do their jobs

Watsons

McAfee helped Watsons deploy the McAfee Enterprise Mobility Management solution. This solution enables employees to decide on their choice of mobile devices while still able to access corporate applications securely and conveniently.

Highlights
  • Reduced the security risks posed by mobile devices at work

Resources

Data Sheets

McAfee Enterprise Mobility Management

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

McAfee Enterprise Mobility Management (McAfee EMM) 12.0

Get answers to questions about McAfee Enterprise Mobility Management.

Solution Briefs

Smarter BYOD

As Gartner predicts, BYOD is here to stay and will soon become the rule rather than the exception. Users are eager to embrace the trend, but IT is reticent for good reason. This solution brief shows IT how to successfully get a handle on BYOD with a scalable strategy and integrated solutions that fall under the umbrella of the Security Connected framework from McAfee.

Securing the Mobile Enterprise

Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.

Say Yes to Mobile Devices

Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure

Learn how to bring mobile devices into the security infrastructure through integration with key security technologies.

Employee Use of Personal Devices

Allowing employees to use their personal mobile devices for work creates a number of risks. In this editorial brief, Jules Polonetsky, director of the Future of Privacy Forum, discusses managing these risks by balancing employee privacy concerns with security initiatives.

Community

Blogs

  • Is This Your Photo? No, It’s SMS Spam With Mobile Malware
    Carlos Castillo - November 26, 2014

    One of the most important concerns of Internet users is privacy. For this reason one of the most effective phishing attacks is to claim that someone’s video or photo is public; thus the victim cannot resist clicking on the malicious link. Recently some people from Singapore (country code +65) have reported a new SMS spam […]

    The post Is This Your Photo? No, It’s SMS Spam With Mobile Malware appeared first on McAfee.

  • Koler Ransomware Extorts Money from Users
    Lianne Caetano - November 18, 2014

    Hands up! Law enforcement agencies want you to pay for your crimes—but wait, what crimes did you commit? While your record may be squeaky clean, this malicious Android app sure isn’t and its makers are doing everything they can to extort money from consumers. I’ve discussed mobile apps that attempt to steal money from users […]

    The post Koler Ransomware Extorts Money from Users appeared first on McAfee.

  • 8 Tips for Raising Generous Givers and Wise Clickers
    Toni Birdsong - November 18, 2014

    For a parent, there’s nothing more heartwarming than seeing your teen slowly emerge from the “me slumber” and begin to genuinely care about giving. And what better time to encourage a giving spirit than the holidays? But there’s a cyber-world lesson that’s critical to teach in tandem with giving, and that is how to click wisely online—especially […]

    The post 8 Tips for Raising Generous Givers and Wise Clickers appeared first on McAfee.

  • Hackers Create Multipronged Approach to Get to Your Phone
    Gary Davis - November 11, 2014

    It’s no secret that most mobile users feel secure without locking their phone. After all, according to Consumer Reports, only 36% of users bother with a basic PIN number. And while securing your mobile phone physically with a PIN number is a great way to lead a more secure life, it isn’t enough. After all, […]

    The post Hackers Create Multipronged Approach to Get to Your Phone appeared first on McAfee.

  • The 12 Scams of the Holidays
    Gary Davis - November 10, 2014

    McAfee’s Annual List Educates Shoppers on How to Avoid Unwrapping an Online Threat and Keep Their Digital Lives Safe As temperatures begin to drop, snow starts to fall, and decorations go up, consumers across the country begin preparing for upcoming holiday festivities. This time of year consumers are rushed and use their devices much more […]

    The post The 12 Scams of the Holidays appeared first on McAfee.