Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

AT&T Partners with McAfee on Mobile Device Management & Security

AT&T has partnered with McAfee to offer

AT&T has partnered with McAfee to offer McAfee’s Enterprise Mobility Management (McAfee® EMM™) software to AT&T customers.

AT&T LogoMcAfee LogoExpanding its portfolio of mobile device management solutions, the new solution allows businesses and organizations to offer employees their choice of mobile devices across multiple operating systems, while delivering secure and scalable access to corporate applications.

According to the results of a recent survey released by Sybase, 90 percent of U.S. and UK IT managers said they are planning to implement new mobile applications this year, with half saying that successfully managing mobile applications tops their priority list. That study also revealed that 21 percent plan introduce 20 or more mobile applications into their organization in 2011. With the volume of corporate data being held on and accessed on mobile devices, securing these mobile devices is becoming a top priority for information security teams. 

With the McAfee EMM solution, enterprises can help their mobile workforces comply with regulatory requirements, and help to manage corporate and personal liability risks. This helps businesses manage compliance issues which have become increasingly pressing due to the proliferation of smartphones and tablets in workplaces.

Related: Mobile & Smart Device Security Survey – Concern Grows as Vulnerable Devices Proliferate

The web-based console enables centralized management and provides visibility into various mobile assets in the enterprise. The integration with McAfee ePolicy Orchestrator® platform makes it easy for administrators to plug mobile devices into their company’s security infrastructure. This allows them to enable, help secure, control, and report on mobile devices as they would any other endpoint, including a laptop, desktop, or server. Additionally, the solution will help IT administrators monitor and prevent unauthorized mobile devices from accessing their corporate network, protecting critical IT assets and ensuring compliance with their company’s policies.

Consumerization of IT has created a number of challenges for businesses,” said Todd Gebhart, executive vice president and general manager, Consumer, Mobile, and Small Business at McAfee. “A lot of employees don’t realize the risk of bringing their personal devices into an office setting. Security on consumer-owned technology tends to be limited – and so people who use these unprotected devices for work can inadvertently reveal proprietary corporate information or put their organization’s IT assets at risk. The McAfee Enterprise Mobility Management solution combats this problem by allowing workers to continue to use their smartphones or tablets with added security and protection for their companies.”

Technical Reading: Designing Security for Newly Networked Devices

In May 2010 AT&T and McAfee announced a partnership in which AT&T would offer a Secure E-mail Gateway Service powered by McAfee, adding e-mail security and message management by scanning messages before they enter an organization’s network and helps monitor and act on all outbound e-mail containing content that could violate data loss prevention policies.

In October 2010, AT&T announced it would offer “AT&T Encrypted Mobile Voice,” a carrier-provided two-factor encryption service, which provides high-level security features for calls on the AT&T wireless network. The service is targeted at government agencies, law enforcement organizations, financial services institutions and international businesses.

Advertisement. Scroll to continue reading.

AT&T’s Advanced Enterprise Mobility Solutions group collaborates with product teams across hosting, application management and unified communications to help mobilize applications for business customers, developers and independent software providers.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.