Video Screencast Help
Information Unleashed

Symantec Continues to Lead the Industry in Enabling Secure Enterprise Mobility

Created: 04 May 2012 • Updated: 08 May 2012
CJ Desai's picture
+2 2 Votes
Login to vote

By CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec

Symantec’s recent 2012 State of Mobility Survey found that organizations across the globe are embracing mobility at unprecedented rates, driven in part by the “Bring Your Own Device” (BYOD) movement. In fact, according to the survey, 59 percent of enterprises are now making line-of-business applications accessible from mobile devices, and another 71 percent are considering implementing a corporate mobile app store.

So, just why are so many organizations gravitating towards mobility? Increased efficiency, increased workplace effectiveness and reduced time required to accomplish tasks are just some of the answers we hear from our customers. In short, the goal is better business agility. Amazingly, organizations are finding that their expectations for the benefits of mobility closely match reality. For example, about three-fourths of the businesses we surveyed expected to increase efficiency through mobile computing, and the full 73 percent actually realized that gain.

However, companies continue to struggle with mobility, especially in light of trends such as BYOD, which complicate the security and management of enterprise mobility. Our survey found that about half of all respondents continue to consider mobile computing to be “somewhat to extremely challenging.” IT’s top mobile-related concerns include device loss, data leakage, unauthorized access to corporate resources and malware infection.

For this reason, enabling secure, manageable enterprise mobility is a top priority for Symantec. Thus, today we announced  some exciting enhancements to our enterprise mobility solution set to help CIOs, CISOs, IT managers, and app developers secure mobile devices, applications and data. The enhancements include:

Mobile Application Management: Just last month, Symantec completed its acquisition of Nukona. As a result, we’re thrilled to now offer industry-leading mobile application management. With this technology, Symantec can now help organizations secure and control corporate apps and data on mobile devices without requiring them to manage entire devices. This technology allows enterprises to simply and effectively embrace BYOD.

Symantec Data Loss Prevention for Mobile: With added support for the iPhone, Symantec Data Loss Prevention for Mobile – formerly Symantec Data Loss for Tablets – will help CISOs monitor and control the transmission of confidential data from all devices running iOS, one of the most widely deployed enterprise mobile operating systems. Combined with the Symantec Mobile Management, Data Loss Prevention for Mobile will provide the industry’s most comprehensive solution to enable secure business and personal use of iOS devices concurrently. Data Loss Prevention for Mobile is scheduled to be generally available in the second half of 2012.

Symantec Certificate Intelligence Center for Mobile: Symantec Certificate Intelligence Center (CIC) for Mobile allows IT managers leverage mobility to easily monitor and manage their SSL certificate inventory from anywhere on their iPads. It provides them with detailed and real-time intelligence into SSL certificate usage on their network environment, helping them maintain business continuity and strengthen network security.

Symantec Code Signing for Android: Available to both individual developers and larger organizations, Symantec Code Signing for Android enables developers to digitally sign their .APK files for the Android platform. Featuring the first ever dedicated Android Root certificate from a security vendor, Symantec Code Signing for Android helps developers ensure their apps are secure.

Symantec’s complete enterprise mobility strategy – including this announcement – makes up the most comprehensive set of enterprise mobility solutions available from a single vendor. Not only this, but these capabilities come from the same company businesses have already come to trust with managing and securing nearly every other aspect of their IT infrastructures.