ATLANTA, June 8 /PRNewswire/ -- Putting the iPhone and iPad into Enterprise Compliance has long seemed an impossible dream, but with Mobile Active Defense (M.A.D.) Enterprise UTM, companies can now satisfy regulators, auditors and their mobile user workforce with a single UTM (Unified Threat Management) console.
Winn Schwartau, Chairman of M.A.D. Partners, LLC, said, "The iPhone and other smartphones are merely small, powerful and mobile computers. Millions of them are trying to connect to corporate networks. I get that. But when smartphones connect to those networks, every semblance of security and compliance collapses. I don't get that companies allow that. So we solved their mobile security problem with Enterprise UTM."
M.A.D. Enterprise UTM allows iPhones and other smartphones to be securely controlled and managed according to company security policy from a central management console.
Suzanne Gorman, Associate Partner at Citihub, and the former Director of Governance at Omgeo, LLC, Chair of the FS-ISAC and the ISAC Council, agrees that organizations that must adhere to regulatory compliance guidelines should be especially concerned about their mobile workforce: "I am well aware of how data leaks and network breaches occur through smartphones. My fellow security executives need to take this threat extremely seriously and do something about it, sooner than later."
M.A.D. Enterprise UTM gives security and policy administrators the same type of control over users' conventional desktops. M.A.D. Partners' CTO, Rob Smith, offers, "M.A.D. provides just about everything the CISO would want. Email security, anti-virus, spam and malware detection and removal, encryption, VPN, a granular policy-driven firewall, content management, inventory control, provisioning and of course, extensive reporting are all standard features."
Kevin Fiscus, National Security Practice Lead for NWN Corporation, says that companies are familiar with solving their internal network security issues: "What has been missing is an enterprise-class solution that could help companies manage the risks associated with smartphones and promote regulatory compliance. Now we have the answer with Mobile Active Defense."
M.A.D. Enterprise UTM puts the company in control of its smartphone, managing everything from passwords to lock settings to remote-wipe if a device is lost or stolen. Because smartphones are single-user devices with limited resources, M.A.D. uses Zero Footprint Technology. "We don't take up bandwidth, CPU or other valuable resource on the smart phone," adds Smith.
Simon Hewitt, CEO of Edusec Pty Ltd. and former CSO of ANZ & Westpac Banking in Australia, sees criminal and other threats moving to the smartphone: "Mobile Active Defense is the solution we can safely say we all needed a decade ago. Problem is, no one would have thought it was needed then. I only hope times have changed as we look to M.A.D. to secure our network's doors and windows this time round."
M.A.D. Enterprise UTM does not require any changes to existing security or IT infrastructures and can be up and running within one day.
SOURCE Mobile Application Development Partners, LLC