ATLANTA, June 8 /PRNewswire/ -- "I'd love to do away with our Blackberries" is an oft-heard complaint from Enterprise security management.
Winn Schwartau, Chairman of M.A.D. Partners, LLC, said, "Companies are no longer locked to the Blackberry for their mobile business and email. They can now securely maintain compliance with iPhones, iPads, WinMobile, Android and Symbian devices. We've solved the problem everyone wanted solved."
Smartphones are merely small, powerful, mobile computers. When millions of them try to connect to corporate networks, every semblance of security and compliance collapses. M.A.D. Enterprise UTM (Unified Threat Management) allows iPhones and other smartphones to be securely controlled and managed according to company security policy from a central management console.
Suzanne Gorman, Associate Partner at Citihub, former Director of Governance at Omgeo, LLC, Chair of the FS-ISAC and the ISAC Council, agrees that organizations that must adhere to regulatory compliance guidelines should be especially concerned about their mobile workforce: "I am well aware of how data leaks and network breaches occur through smartphones. My fellow security executives need to take this threat extremely seriously and do something about it, sooner than later."
M.A.D. Enterprise UTM gives security and policy administrators the same type of control over users' conventional desktops. M.A.D. Partners' CTO, Rob Smith, offers, "M.A.D. provides just about everything the CISO would want. Email security, anti-virus, spam and malware detection and removal, encryption, VPN, a granular policy-driven firewall, inventory control, provisioning and, of course, extensive reporting are all standard features."
Kevin Fiscus, National Security Practice Lead for NWN Corporation, says, "Once upon a time, mobility was not a big problem because everyone used Blackberrys. Today, users demand iPhones and companies have to support more varieties of smartphones than laptops. What was needed was an enterprise-class solution that could manage the risks associated with smartphones and promote regulatory compliance. Now we have the answer with Mobile Active Defense."
Because smartphones are single-user devices with limited resources, M.A.D. developed Zero Footprint Technology. "We don't take up bandwidth, CPU or other valuable resources on the smartphone," adds Smith. "Nonetheless, M.A.D. Enterprise UTM controls everything from passwords to lock settings to remote wipe if a device is lost or stolen."
Simon Hewitt, CEO of Edusec Pty Ltd and former CSO of ANZ & Westpac Banking in Australia, sees criminal and other threats moving to the smartphone: "Mobile Active Defense is the solution we can safely say we needed a decade ago. Problem is, no one would have thought it was needed then. I only hope times have changed as we can look to use M.A.D. to secure both our network's doors and windows this time round."
M.A.D. Enterprise UTM does not require any changes to existing security or IT infrastructures and can be up and running within one day.
SOURCE Mobile Application Development Partners, LLC