Contact Us

|

Careers

|

Change Locale
close

Smartphones: Mixing Business with Pleasure [McAfee]

Client Computing | Posted on May 27, 2012 by Melissa Alvares

Protecting devices that have personal and corporate data on them.

People are 15 times more likely to lose a mobile phone than a laptop, making loss the biggest threat to mobile users. But it’s not hardware replacement costs that pose the greatest risk.

After all, as consumerization and BYO trends take hold in the business world, personal smartphones have become an important tool used by organizations to keep employees connected and productive. Smartphones are increasingly brimming not just with vacation pics and Angry Birds scores but with corporate data.

That means these devices don’t just give employees more freedom to work when, where and how they like. They’re also a potential entry point for abuse and unauthorized access to corporate networks and potentially sensitive information.

Smart organizations that allow personal phones on company networks are proactively training employees to be vigilant about smartphone safety and requiring them to report lost or stolen devices as soon as possible. But often that’s not enough so IT departments are instituting anti-theft and data protection solutions to secure smartphones and the sensitive information contained on them.

The McAfee Enterprise Mobility Management (McAfee EMM) platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.

Control, compliance, and convenience.

The tension between these factors has made it difficult for IT to consent to enterprise user demands to use their preferred mobile devices. Now IT wields control over mobile devices to match its ability to manage laptops and other endpoints, using the same management and reporting tools.

Key advantages of this technology include:

  • Enterprise-class security – Extends enterprise security, visibility, and control to heterogeneous mobile devices as IT gains the same control they have over traditional endpoints, managing native device security settings, enabling PKI integration, supporting two-factor authentication, and enforcing configuration policies prior to network access
  • Easy for both IT and users – Erases the frustration and complexity of maintaining fast-changing devices, applications, and large user bases with self-service activation, bulk provisioning capabilities, an enterprise app store for approved applications, simple IT administration via McAfee ePO software, and seamless integration of mobile devices into data center resources.
  • Scalable to tens of thousands of heterogeneous devices – Delivers continuous availability of business-critical mobile applications through an enterprise-grade architecture that works with your existing environment and can be virtualized, load-balanced, and clustered.

To learn more about how businesses are protecting themselves and employees from smartphone and business data loss, watch this short video “What’s So Great About Enterprise Mobility Management?”

Related Articles

Client Computing | July 22, 2019 by Susana Byun

Here are your top 5 must-read announcements from Microsoft this month:

Client Computing | June 13, 2019 by Susana Byun

Here are our 9 must-read topics from Microsoft on June 2019:

Client Computing | May 15, 2019 by Susana Byun

Here are our 9 must-read topics from Microsoft on May 2019: