Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Managing Mobility
Showing posts tagged with Mobile Management
Showing posts in English
CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Solange Deschatres | 23 Jun 2014 | 0 comments

BYOD vs CYOD.jpegThe last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature.

But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every evening, and what happens to it off-site often has IT staff pulling their hair out. According to Osterman Research, 15% of employees...

Matthew Nelson | 23 Apr 2014 | 0 comments

More and more organizations around the globe permit employees to bring their own mobile devices to work so they can access company data from any location at any time with any device. The bring your own device (BYOD) phenomenon started gaining traction around 2007 when executives and board members brought the first personal smart phones and tablets into the corporate workspace. Since then, the BYOD trend has skyrocketed as employees began to expect the same kind of flexibility and employers saw increased productivity by allowing employees to use mobile devices both at work and home.

Employee and Employer Attitudes

Cisco recently revealed that 95% of IT and business leaders surveyed in the United States say their organizations permit employee-owned devices in some way, shape or form. The survey goes on to cite employees’ desire to use their...

CherylTang | 20 Feb 2014 | 0 comments

 

 

Symantec-Evergreen-Oct-MobilityCON-Group.jpeg

Mobility is a reality of today’s business environment. Look around and you’ll see people working on smartphones and tablets at coffee shops, on trains, planes and yes, even at their kids’ soccer games. While mobility is a boon for employee productivity, it has created security and management challenges for IT organizations.

Many companies turned to Mobile Device Management (MDM), expecting it to be a panacea for enterprise mobile security, only to find that relying solely on MDM was simply not enough. While MDM is important, there is more to an enterprise mobility strategy than just managing devices. Enter Mobile Application Management (MAM). Today, companies are broadening their mobile strategy to include developing, deploying, securing and managing mobile apps.

If you’re...

Swarna | 29 Sep 2013 | 4 comments

 

The much-awaited iOS 7 is here.   With iOS 7, Apple introduced advanced functionality with iOS7, not just for consumers but also for enterprise users.  For consumers, capabilities such as enhanced camera options, ease of multitasking, photo library, control center, notification center, AirDrop and AirPrint, to name a few, are fantastic. They make it really easy for me to share information and be productive.

However, along with the advanced feature set comes additional security gaps that will be of greater concern for many enterprises.  As the leader in security, this is where it makes our job even more exciting. Our first goal is to secure those glaring new security gaps that come with iOS 7.

Let me explain.

Apple introduced AirDrop on Macs two years ago with OS X Lion for Mac users to transfer files...

Swarna | 14 Sep 2013 | 0 comments

 

Here we are, 24 hours away from M6 Mobility Xchange in San Diego.   I am very excited to attend this event for the first time and I cannot write enough about how proud we are to share with you about the activity lineup we have at M6.

Ever since Symantec’s 4.0 strategy was announced, there has been a huge culture, mindset shift within the company.  Products and people were reorganized to align with the  “jobs” that our customers are trying to solve; instead of grouping them way we developed the products.  One of the “peaks” of the solutions that was formed in the new Symantec world is User Productivity and Protection.  The solutions that are mapped into this peak are all those that protect the users, their data, their devices and enable them to stay...

FranRosch | 16 Apr 2013 | 0 comments

The unstoppable BYOD trend is crossing over to the mainstream and continues to impact the way businesses must think about and address mobile productivity. Users are mastering mobile devices on their own time and are using them as time-saving tools, creating increased demand on businesses to respond with appropriate policies and technologies to keep their data safe. Symantec’s Internet Security Threat Report, released today, highlights a 58 percent increase in mobile threats targeting these devices, with almost a third designed to steal information. Symantec already offers the broadest array of technologies to keep mobile business data safe, and we have recently added several more items to that list with new updates to the Symantec Mobile Management Suite.

To truly keep business data safe in today’s increasingly complex IT environment, mobility solutions must be able to effectively address the challenges across...

Will Redfield | 04 Oct 2012 | 0 comments

Businesses today are dealing with incredible advances in mobile device technology, massive adoption of smart devices and an unstoppable BYOD trend. In response, most enterprises have multiple mobility initiatives spread across their organization – some focused on mobile email, some focused on mobile apps, and others focused on mobile content. Within these initiatives, there are diverse ownership models and varying levels of enterprise management possible. In some use cases (corporate owned devices), complete management of devices is needed, but in other cases (personally owned devices), enterprises may only want control of specific corporate apps and data – not the whole device.To achieve these widely varying enterprise business objectives, an ideal enterprise mobility solution should address diverse use cases and ownership models. To help enterprises take full advantage of mobility without sacrificing protection, Symantec announced today the availability of the...