Video Screencast Help
Information Unleashed
Showing posts tagged with mobile security
Showing posts in English
Solange Deschatres | 25 Apr 2014 | 0 comments

This blog was authored by Con Mallon, Sr. Director of Product Management, Mobility Solutions, at Symantec.

Symantec recently published an updated version of Norton Spot in Google Play (US-English only), and with it, turned the traditional Android mobile security model on its head with a new take on how we use our Mobile Insight technology.

Norton Spot is running a beta app that scans for problematic apps before you download them to your device. There are many mobile security products for Android, all of which take a similar approach when it comes to scanning apps for malware and privacy: the customer downloads and installs the app from an app store and at the point of installation, the mobile security product scans the app and notifies the user as to whether it is malicious. There is also a smaller subset of these products, including Norton...

Symantec Corp. | 20 Nov 2012 | 0 comments

By Sanjay Sawhney, Senior Director of Research at Symantec Research Labs

The technology landscape is rapidly changing into a more mobile and cloud-based world.  And in this world, the end user and servers (services provided to the end user) are ‘virtual’ or decoupled from devices, physical machines and networks.

However, there are a few constants:

  • The user and server have to share a single root of trust with one another (mutual authentication)
  • The data and sharing of the data drives a lot of the end user experience; not the device or the application
  • In this evolving technology landscape, who does what  with any piece of data is the most important aspect of providing security
  • Harnessing the humongous data...
Guido Sanchidrian | 24 May 2012 | 2 comments

The last few days I spent some time to digest the latest Symantec Internet Security Threat Report Volume 17. This comprehensive report provides an overview and analysis of the year 2011 in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

I am an active member of the Cloud Security Alliance Mobile Working Group, where we actually do research on secure mobile endpoint computing, which will result into valuable guidelines to be published this year. Therefore my Threat Report reading was likely shorten through the lens of...

bduckering | 17 May 2012 | 0 comments

In October of 2010, Symantec publicly announced its mobile protection strategy, defining a new era in how Symantec secures and manages the information and identities of consumers, businesses and governments in an increasingly mobile world. At its core, the announcement laid out our protection strategy and approach for enterprises, consumers and communication service providers.

That approach is still at the core of how Symantec is addressing the larger mobility trend. However, we continue to strengthen and refine our approach as advancements in mobility develop and changes to the mobile threat landscape evolve. In that regard, Symantec announced some significant advancements to its overall mobile strategy in February of this year and demonstrated that we have delivered on our mobile strategy. Some of those advancements hinged on the acquisition of Odyssey Software.

Odyssey...