McAfee Mobility Management released

April 2011 Information Security, Products & Solutions

Over the last year businesses have realised a growth in the number of user devices being used in the workplace – such as smartphones and tablets - a move that has resulted in the need for an extension of most security infrastructures.

In response to this need, AxizWorkgroup has announced the local availability of McAfee’s Enterprise Mobility Management (EMM) 9.5 software. EMM now includes integration with the McAfee ePolicy Orchestrator (ePO) platform, providing customers with unified management of their endpoint, network and data security products.

“The end-to-end visibility and control provided by the ePO platform will help IT administrators dramatically strengthen their protection and drive down the cost and complexity of managing their risk and security,” says Andrea van der Westhuizen, product manager, McAfee at AxizWorkgroup.

Additional new features and benefits of EMM 9.5 include:

* Enterprise App Store – Businesses can now offer recommended applications through a secure enterprise app store, while maintaining complete visibility into the applications that reside on these employee-owned devices.

* Enhanced iOS4 support – EMM 9.5 features a full API set for mobile device management, allowing IT administrators the ability to create a list of recommended applications-based parameters such as the user and their roles and responsibilities, and sub-lists, which can be sent to individuals or groups.

* Enhanced public key infrastructure (PKI) capabilities – McAfee now offers PKI capabilities through the Microsoft Certificate Authority, providing strong authentication for devices accessing the corporate network. Smartphones and tablets can now connect to the network VPN using client certificates, in the same way as laptops.

* Support for the Android Tablet – In addition to support for the Android 2.2 and Motorola Droid Pro, EMM 9.5 now extends support for Android 2.3 and offers full support for Android-based tablets.

* Enhanced Lotus Domino support – Lotus Domino users using Lotus Traveller 8.5.2 can now leverage the capabilities of EMM software.

EMM 9.5 lets companies extend the data centre to smartphones and tablets in the same way they do for laptops, leveraging the native capabilities of the device and the enterprise IT infrastructure to deliver native applications.

“The solution – with its scalable, server-centric architecture – lets organisations manage the next generation of mobile devices with the same security, control and visibility they have with their other endpoints,” says Van der Westhuizen.

For more information contact Andrea van der Westhuizen, AxizWorkgroup, +27 (0)11 654 6000, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...