M.A.D. Partners + SRA Offer Mobile Security Solution for Government

— December 06, 2010

M.A.D. Partners, a smartphone security company, announced an agreement with SRA International, Inc., a provider of technology and strategic consulting services and solutions to government organizations and commercial clients. Under the agreement, SRA will be able to offer federal customers a range of services to protect and secure iPhones/iPads.
 
M.A.D's Mobile Enterprise Compliance and Security Server (MECS) locks down iPhones and iPads, as well as multiple platforms of smartphone and tablet devices, enabling IT security personnel to effectively manage and secure their mobile population. Through this partnership, SRA will host its own MECS servers to provide iPhone, iPad, and Android operating system security for federal customers. SRA also will offer a range of mobile security services, including hosting, migration, integration, and training.
 
Winn Schwartau, chairman of M.A.D Partners says, "SRA's extensive experience in IT and integration in the federal space is an ideal match with M.A.D., and an important alliance for us and for the government. It's exactly what agencies and departments have been asking for and now is available through SRA -- a company they know and trust."
 
"iPhone and iPad-like mobile devices are offering tremendous operational utility to our clients across both commercial and government organizations," said SRA SVP of offerings and products Pat Burke. "As a result, CIOs and chief information security officers (CISOs) are facing a growing demand from their senior executives to safely integrate these mobile devices into their enterprise IT infrastructures without compromising their enterprise security. SRA's partnership with M.A.D. allows us to address this strategic priority while ensuring we continue to enhance our clients' security, privacy, and compliance posture."
 
The SRA-hosted MECS servers extend existing enterprise and network security policies across mobile platforms with complete enforced encryption, certificates of authority, granular policy driven firewall controls, a suite of content filtering and device management tools, anti-virus and malware eradication, including jail breaking detection and remediation. The security profile of every secured device is automatically updated more than 100 times every day, keeping mobile networks secure, compliant, and protected from breaches and data leaks. M.A.D. employs Zero Footprint Security, uses no resources on the mobile device itself, and the user sees no change in his experience.
 
As Rob Smith, CTO of M.A.D. Partners, LLC says, "As the use of smartphones and tablet devices continues to grow across all government sectors, so have the security risks increased exponentially. Our partnership helps align our shared vision of a safe and secure mobile computing experience for everyone, without limiting them to only one approved device."

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Who Owns Mobility

Less than one decade ago, smartphones and tablets changed workplace technology—virtually overnight. IT lost "control" and users became decision makers. Is it any wonder we are still trying to figure things out, and that the question of  "who owns mobility" remains? This research examines the current state of mobility in an attempt to answer that question.