Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Pat Romanski, AppDynamics Blog, Roger Strukhoff

News Feed Item

McAfee Delivers on Intel Vision of Free Mobile Security for Consumers

Mobile World Congress – Today McAfee announced a full-featured version of its award-winning McAfee Mobile Security is now available at no cost in 30 languages, as part of an Intel Corporation initiative to make security a more integrated part of the consumer experience. The free version of McAfee’s security app for Android includes enhanced protection features and, for the first time, unlocks security extensions for Intel-based mobile devices, making it the most comprehensive free mobile solution for consumers on the market. McAfee also recently launched McAfee Mobile Security for iOS, which is also available free of charge.

Earlier this year at the International Consumer Electronics Show in Las Vegas, Intel CEO Brian Krzanich announced plans to offer elements of McAfee’s award-winning security solutions for mobile devices for free, and today’s announcement is an important milestone in that plan.

“We live in an unprecedented era of always-connected devices, where security and privacy protection are fundamental,” said John Giamatteo, senior vice president and general manager, McAfee consumer business. “With free access to our award-winning mobile security product, consumers are free to experience everything this connected world has to offer, without fear of their personal information being compromised.”

McAfee Mobile Security Now Available Free for Consumers

McAfee Mobile Security, available for immediate download in the Google Play Store, now offers its comprehensive, award-winning protection against privacy and security threats at no cost to consumers. According to McAfee’s findings from the 2014 Love, Relationships & Technology survey, consumers are sharing and storing more information than ever, without taking the necessary steps to protect their mobile devices.

With privacy and identity in mind, McAfee Mobile Security for Android is designed to prevent privacy invasions, data loss, identity theft and device disappearances. It includes anti-theft, anti-virus, app protection, Web protection, call and SMS filtering. In AV-Test’s most recent effectiveness test for mobile security products, McAfee Mobile Security received a 100% detection score and was given a top ranking among the 30 vendors that participated in the independent test.

McAfee recently launched McAfee® Mobile Security for iOS devices, featuring a number of comprehensive protection options previously available only to Android users. Available for free, the software provides iPhone and iPad users with a secure vault for private content, secure camera, jailbreak detection, backup capabilities and more.

Enhanced McAfee Mobile Security

Android malware almost tripled from 2012 to 2013, according to McAfee’s third Consumer Mobile Security Report. The latest version of McAfee Mobile Security, including the free version, is now equipped with several new features that are designed to protect consumers against security vulnerabilities and address the problems created by lost or stolen devices. The new Wi-Fi Security feature allows users to connect to any Wi-Fi network with confidence, knowing that McAfee will alert them to any risky or non-password protected networks that they may be connecting to.

In 2012, 1.6 million Americans fell victim to smartphone theft, and stolen mobile phones cost consumers over $30 billion¹. To combat this, when there is suspicious activity such as multiple incorrect attempts to unlock the device, users can activate a new CaptureCam to snap a picture of the person holding the device. The picture, along with the location, is sent to the account owner, revealing who is in possession of the lost or stolen device. A new SOS feature will also save the last location of a device before the battery runs out.

McAfee Mobile Security now provides new kernel-level security extensions through integration with Intel Device Protection Technology. This technology helps to proactively block and secure devices from malware delivered through malicious applications and websites while minimizing impact to performance and conserving battery power, when paired with a security service such as McAfee Mobile Security.

Industry Leadership

McAfee is expanding its mobile footprint by continuing to partner with some of the industry’s top global brands. Verizon and LG have just been added to its list of over 110 partners. By partnering with these leading brands, both companies are coordinating and leveraging their strengths to help keep consumers safe while connecting with their mobile devices.

McAfee at Mobile World Congress

At Mobile World Congress, McAfee and Intel will be providing demos of McAfee Mobile Security at the Intel booth #3D30, Hall 3.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. McAfee delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. More information is available at www.mcafee.com.

Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

¹ Press Release from San Francisco District Attorney’s Press Office: http://www.sfdistrictattorney.org/index.aspx?page=262

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Why does developer experience matters, what makes for a great developer experience and what is the relationship between developer experience and the broader field of user experience? Software developers are gaining more influence over the purchase decisions of technologies with which they must build on and with which they must integrate. For example, the success of Amazon Web Services, Heroku and MongoDB has been driven primarily by individual software developers choosing to use these tools, ra...
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
SYS-CON Events announced today that the "First Containers & Microservices Conference" will take place June 9-11, 2015, at the Javits Center in New York City. The “Second Containers & Microservices Conference” will take place November 3-5, 2015, at Santa Clara Convention Center, Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what th...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...