Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Managing Mobility
Showing posts tagged with Symantec Mobility Threat Protection
Showing posts in English
Ryan Terry | 01 Dec 2014 | 4 comments

Symantec is pleased to announce that Mobility Suite 5.1 will be generally available today, December 1, 2014!  Mobility Suite 5.1 continues Symantec’s improvements featured in the Mobility Suite 5.0 release with improvements across MDM, Secure Email, and Threat Protection.  Mobility Suite 5.1 will be available as both SaaS (December 4th) and On-Premise versions.

Symantec Mobility: Suite makes mobility manageable and secure, integrating mobile device management (MDM), mobile application management (MAM), and threat protection into one centrally controlled console.  Mobility Suite 5.1 delivers enhancements for both administrators and end-users. 

Feature Highlights

Improved MDM

  • Expanded certificate support with Microsoft Certificate Authority for iOS
    • Integration with Microsoft CA for...
Ryan Terry | 06 Oct 2014 | 5 comments

VIDEO: Introducing Symantec Mobility: Suite

Today mobility offers ‘any device, any time, any place’ productivity, appealing to both enterprises and employees.  However, that flexibility comes with challenges – protecting corporate data on devices, separating personal and corporate information, managing diverse operating systems, and preventing devices and apps from becoming another attack vector.

With Symantec™ Mobility: Suite (v.5.0), available today, customers can now rely on a single unified solution of control that enforces consistent security standards, regardless of device type, without impeding the end user’s productivity or personal privacy. Mobility Suite simplifies mobility management, integrating mobile device management (MDM), mobile application management (MAM) and mobile threat protection into one comprehensive, single console solution. Whether a user’s environment is...

MelanieLopez | 01 Oct 2014 | 0 comments

We’re happy to share that Symantec was named a Leader in the Forrester Wave™: Enterprise Mobile Management, Q3 2014! The research conducted by Forrester Research, Inc. evaluated Symantec and 14 other vendors against 27 criteria for current offering, strategy, and market presence.

Symantec was identified as one of ten vendors that “lead the pack.” The leaders were noted for separating ourselves from other vendors by introducing a strong security background without disruption for the employee. Forrester defines Leaders as balancing OS, application, and data management functionality while providing flexible container options and productivity applications, and have demonstrated a strong vision and roadmap to help customers as they bring their PC and mobile management strategies together.

Symantec received a high score overall in the current offering category, and the highest possible score for App Security. Forrester Research noted Symantec for the...

Solange Deschatres | 22 Sep 2014 | 0 comments

Information for this post was provided by Maribel Lopez, Principal and Founder of Lopez Research, which provides market research, visionary keynotes, strategic consulting services and partnership development services.

classroom.jpgEmployers who’ve embraced Bring Your Own Device (BYOD) programs do so anticipating a more nimble workforce; employees being reachable everywhere, collaboration across geographies, and less company-owned hardware to purchase. While employees enjoy the freedom to use their own device, organizations sometimes fail to properly cover all of the necessary staff training that accompanies a BYOD program. Similarly, emails to employees regarding the changes BYOD brings or a buried/confusing policy can be missed, leading employees to fail to...

CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Solange Deschatres | 23 Jun 2014 | 0 comments

BYOD vs CYOD.jpegThe last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature.

But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every evening, and what happens to it off-site often has IT staff pulling their hair out. According to Osterman Research, 15% of employees...

MelanieLopez | 06 May 2014 | 2 comments

Symantec would like to announce the release of App Center version 4.4. The Symantec App Center 4.4 release allows IT to confidently embrace Android in the enterprise and improves security for email and app access. This release delivers integrated threat protection for Android and support for Android 4.4 operating system. It also includes Secure Email and App Proxies for control of network access policies and compliance. These new features and others are available now in your App Center console to upgrade.

Summary of New Features

  1. Confidently embrace Android in the enterprise
  2. Improved email and app security
  3. Improved usability in admin console

Feature Highlights

1.  Confidently embrace Android in the enterprise

  • Integrated mobile threat protection
    • Protects Android users from privacy risks, mobile malware, greyware, fraudulent websites and more...
Matthew Nelson | 23 Apr 2014 | 0 comments

More and more organizations around the globe permit employees to bring their own mobile devices to work so they can access company data from any location at any time with any device. The bring your own device (BYOD) phenomenon started gaining traction around 2007 when executives and board members brought the first personal smart phones and tablets into the corporate workspace. Since then, the BYOD trend has skyrocketed as employees began to expect the same kind of flexibility and employers saw increased productivity by allowing employees to use mobile devices both at work and home.

Employee and Employer Attitudes

Cisco recently revealed that 95% of IT and business leaders surveyed in the United States say their organizations permit employee-owned devices in some way, shape or form. The survey goes on to cite employees’ desire to use their...

MelanieLopez | 15 Apr 2014 | 0 comments

As mobile device management solutions become more commonplace in the enterprise, many of the conversations I've had about "What's next?" with customers (both potential and current), lead to larger discussion about their data protection strategy for mobile.

MDM is not enough

Companies are coming to the conclusion that "MDM" (mobile device management) alone is not going to solve for protecting corporate data; and that perhaps an integrated solution offering anti-malware (mobile security), device management (MDM), and app/data protection (MAM) capabilities is worth evaluating.

While standalone solutions can be valuable, the real power comes from integration, and aggregating the telemetry coming from these mobile devices. This allows IT to empower the user to maintain the hygiene of their own device, and still provide the proper level of access to corporate data based on that information.

Corporate-owned or BYOD

Let's use a real-...