Video Screencast Help
Managing Mobility
Showing posts tagged with Mobile Security
Showing posts in English
CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Solange Deschatres | 23 Jun 2014 | 0 comments

BYOD vs CYOD.jpegThe last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature.

But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every evening, and what happens to it off-site often has IT staff pulling their hair out. According to Osterman Research, 15% of employees...

MelanieLopez | 06 May 2014 | 2 comments

Symantec would like to announce the release of App Center version 4.4. The Symantec App Center 4.4 release allows IT to confidently embrace Android in the enterprise and improves security for email and app access. This release delivers integrated threat protection for Android and support for Android 4.4 operating system. It also includes Secure Email and App Proxies for control of network access policies and compliance. These new features and others are available now in your App Center console to upgrade.

Summary of New Features

  1. Confidently embrace Android in the enterprise
  2. Improved email and app security
  3. Improved usability in admin console

Feature Highlights

1.  Confidently embrace Android in the enterprise

  • Integrated mobile threat protection
    • Protects Android users from privacy risks, mobile malware, greyware, fraudulent websites and more...
Matthew Nelson | 23 Apr 2014 | 0 comments

More and more organizations around the globe permit employees to bring their own mobile devices to work so they can access company data from any location at any time with any device. The bring your own device (BYOD) phenomenon started gaining traction around 2007 when executives and board members brought the first personal smart phones and tablets into the corporate workspace. Since then, the BYOD trend has skyrocketed as employees began to expect the same kind of flexibility and employers saw increased productivity by allowing employees to use mobile devices both at work and home.

Employee and Employer Attitudes

Cisco recently revealed that 95% of IT and business leaders surveyed in the United States say their organizations permit employee-owned devices in some way, shape or form. The survey goes on to cite employees’ desire to use their...

MelanieLopez | 15 Apr 2014 | 0 comments

As mobile device management solutions become more commonplace in the enterprise, many of the conversations I've had about "What's next?" with customers (both potential and current), lead to larger discussion about their data protection strategy for mobile.

MDM is not enough

Companies are coming to the conclusion that "MDM" (mobile device management) alone is not going to solve for protecting corporate data; and that perhaps an integrated solution offering anti-malware (mobile security), device management (MDM), and app/data protection (MAM) capabilities is worth evaluating.

While standalone solutions can be valuable, the real power comes from integration, and aggregating the telemetry coming from these mobile devices. This allows IT to empower the user to maintain the hygiene of their own device, and still provide the proper level of access to corporate data based on that information.

Corporate-owned or BYOD

Let's use a real-...

CherylTang | 26 Mar 2014 | 0 comments


Earlier this month at Mobile World Congress, Symantec announced File Sync and Share that is truly private.  So how private is private enough?  The answer depends on who you are, what you are trying to keep private and whom you are trying to keep it private from.  Keeping family vacation pictures from turning up on the local newspaper may be less important than preventing company confidential information from falling into the hands of competitors domestic or foreign.


Today’s increasingly mobile workforce and the adoption of user-provided devices (BYOD) is driving the need for being able to access company content anywhere from any

device.  Yet, achieving this greater access often comes with an increased risk.  Employees typically resort to using file sharing services without the endorsement and support of their...

CherylTang | 20 Feb 2014 | 0 comments




Mobility is a reality of today’s business environment. Look around and you’ll see people working on smartphones and tablets at coffee shops, on trains, planes and yes, even at their kids’ soccer games. While mobility is a boon for employee productivity, it has created security and management challenges for IT organizations.

Many companies turned to Mobile Device Management (MDM), expecting it to be a panacea for enterprise mobile security, only to find that relying solely on MDM was simply not enough. While MDM is important, there is more to an enterprise mobility strategy than just managing devices. Enter Mobile Application Management (MAM). Today, companies are broadening their mobile strategy to include developing, deploying, securing and managing mobile apps.

If you’re...

Swarna | 29 Sep 2013 | 4 comments


The much-awaited iOS 7 is here.   With iOS 7, Apple introduced advanced functionality with iOS7, not just for consumers but also for enterprise users.  For consumers, capabilities such as enhanced camera options, ease of multitasking, photo library, control center, notification center, AirDrop and AirPrint, to name a few, are fantastic. They make it really easy for me to share information and be productive.

However, along with the advanced feature set comes additional security gaps that will be of greater concern for many enterprises.  As the leader in security, this is where it makes our job even more exciting. Our first goal is to secure those glaring new security gaps that come with iOS 7.

Let me explain.

Apple introduced AirDrop on Macs two years ago with OS X Lion for Mac users to transfer files...

Swarna | 14 Sep 2013 | 0 comments


Here we are, 24 hours away from M6 Mobility Xchange in San Diego.   I am very excited to attend this event for the first time and I cannot write enough about how proud we are to share with you about the activity lineup we have at M6.

Ever since Symantec’s 4.0 strategy was announced, there has been a huge culture, mindset shift within the company.  Products and people were reorganized to align with the  “jobs” that our customers are trying to solve; instead of grouping them way we developed the products.  One of the “peaks” of the solutions that was formed in the new Symantec world is User Productivity and Protection.  The solutions that are mapped into this peak are all those that protect the users, their data, their devices and enable them to stay...