Welcome!

News Feed Item

McAfee Delivers on Intel Vision of Free Mobile Security for Consumers

Mobile World Congress – Today McAfee announced a full-featured version of its award-winning McAfee Mobile Security is now available at no cost in 30 languages, as part of an Intel Corporation initiative to make security a more integrated part of the consumer experience. The free version of McAfee’s security app for Android includes enhanced protection features and, for the first time, unlocks security extensions for Intel-based mobile devices, making it the most comprehensive free mobile solution for consumers on the market. McAfee also recently launched McAfee Mobile Security for iOS, which is also available free of charge.

Earlier this year at the International Consumer Electronics Show in Las Vegas, Intel CEO Brian Krzanich announced plans to offer elements of McAfee’s award-winning security solutions for mobile devices for free, and today’s announcement is an important milestone in that plan.

“We live in an unprecedented era of always-connected devices, where security and privacy protection are fundamental,” said John Giamatteo, senior vice president and general manager, McAfee consumer business. “With free access to our award-winning mobile security product, consumers are free to experience everything this connected world has to offer, without fear of their personal information being compromised.”

McAfee Mobile Security Now Available Free for Consumers

McAfee Mobile Security, available for immediate download in the Google Play Store, now offers its comprehensive, award-winning protection against privacy and security threats at no cost to consumers. According to McAfee’s findings from the 2014 Love, Relationships & Technology survey, consumers are sharing and storing more information than ever, without taking the necessary steps to protect their mobile devices.

With privacy and identity in mind, McAfee Mobile Security for Android is designed to prevent privacy invasions, data loss, identity theft and device disappearances. It includes anti-theft, anti-virus, app protection, Web protection, call and SMS filtering. In AV-Test’s most recent effectiveness test for mobile security products, McAfee Mobile Security received a 100% detection score and was given a top ranking among the 30 vendors that participated in the independent test.

McAfee recently launched McAfee® Mobile Security for iOS devices, featuring a number of comprehensive protection options previously available only to Android users. Available for free, the software provides iPhone and iPad users with a secure vault for private content, secure camera, jailbreak detection, backup capabilities and more.

Enhanced McAfee Mobile Security

Android malware almost tripled from 2012 to 2013, according to McAfee’s third Consumer Mobile Security Report. The latest version of McAfee Mobile Security, including the free version, is now equipped with several new features that are designed to protect consumers against security vulnerabilities and address the problems created by lost or stolen devices. The new Wi-Fi Security feature allows users to connect to any Wi-Fi network with confidence, knowing that McAfee will alert them to any risky or non-password protected networks that they may be connecting to.

In 2012, 1.6 million Americans fell victim to smartphone theft, and stolen mobile phones cost consumers over $30 billion¹. To combat this, when there is suspicious activity such as multiple incorrect attempts to unlock the device, users can activate a new CaptureCam to snap a picture of the person holding the device. The picture, along with the location, is sent to the account owner, revealing who is in possession of the lost or stolen device. A new SOS feature will also save the last location of a device before the battery runs out.

McAfee Mobile Security now provides new kernel-level security extensions through integration with Intel Device Protection Technology. This technology helps to proactively block and secure devices from malware delivered through malicious applications and websites while minimizing impact to performance and conserving battery power, when paired with a security service such as McAfee Mobile Security.

Industry Leadership

McAfee is expanding its mobile footprint by continuing to partner with some of the industry’s top global brands. Verizon and LG have just been added to its list of over 110 partners. By partnering with these leading brands, both companies are coordinating and leveraging their strengths to help keep consumers safe while connecting with their mobile devices.

McAfee at Mobile World Congress

At Mobile World Congress, McAfee and Intel will be providing demos of McAfee Mobile Security at the Intel booth #3D30, Hall 3.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. McAfee delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. More information is available at www.mcafee.com.

Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

¹ Press Release from San Francisco District Attorney’s Press Office: http://www.sfdistrictattorney.org/index.aspx?page=262

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Providing the needed data for application development and testing is a huge headache for most organizations. The problems are often the same across companies - speed, quality, cost, and control. Provisioning data can take days or weeks, every time a refresh is required. Using dummy data leads to quality problems. Creating physical copies of large data sets and sending them to distributed teams of developers eats up expensive storage and bandwidth resources. And, all of these copies proliferating...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...