Product Watch: Upstart Launches New Technology For Managing Smartphone Security

Mobile Active Defense system described as unified threat management for smartphones

2 Min Read

Employees want to connect their smartphones to your enterprise network. Trouble is, those connections can open new security holes and even cause the enterprise to slip out of compliance with regulatory requirements.

As IT wrestles with the "consumerization" of the corporate network, a new player says it might have an answer to the smartphone security problem.

Mobile Active Defense, an upstart vendor chaired by security expert and author Winn Schwartau, yesterday launched the MAD Enterprise Unified Threat Management system, which lets IT organizations control and manage iPhones and other smartphones according to company security policy from a central management console.

MAD Enterprise UTM is a centrally administered system that provides security capabilities remotely for smartphones, but does not require downloading of applications to each device.

"The problem with the smartphone [security] technology so far is that it all requires apps to be loaded onto the phone," Schwartau says. "If you want antivirus, you have to load it. If you want malware detection, you have to load that. But the smartphone only has so much memory -- you can't use it all up doing security.

"What we're offering is something that has zero footprint on the smartphone itself. And you can require it in order to connect to the corporate network, so there won't be any rogues."

The MAD Enterprise UTM offers a variety of security capabilities with a single implementation, says MAD CTO Rob Smith. "M.A.D. provides just about everything the CISO would want," Smith says. "Email security, antivirus, spam and malware detection and removal, encryption, VPN, a granular, policy driven firewall, inventory control, provisioning, and of course, extensive reporting are all standard features."

Deployment of the MAD Enterprise UTM could help companies maintain compliance with regulatory requirements, such as HIPAA or PCI, Schwartau says. "A lot of companies don't realize that by allowing smartphones to connect to the corporate net, they're actually creating compliance problems," he says. "These are basically small computers, but they don't have the same security capabilities that the regular computers have."

In order to remain compliant, some companies have begun issuing standardized smartphones that are configured to meet compliance requirements, Schwartau notes. MAD Enterprise UTM takes a different approach, configuring devices remotely to work within corporate security policy.

In its initial release, the MAD Enterprise UTM supports iPhone, iPad, and WinMobile devices. Android support will be next, Schwartau says, followed by Symbian.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Tim Wilson, Editor in Chief, Dark Reading


Tim Wilson is Editor in Chief and co-founder of Dark, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights