Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Managing Mobility
Showing posts tagged with Mobile Mobility Device Management
Showing posts in English
Ryan Terry | 01 Dec 2014 | 4 comments

Symantec is pleased to announce that Mobility Suite 5.1 will be generally available today, December 1, 2014!  Mobility Suite 5.1 continues Symantec’s improvements featured in the Mobility Suite 5.0 release with improvements across MDM, Secure Email, and Threat Protection.  Mobility Suite 5.1 will be available as both SaaS (December 4th) and On-Premise versions.

Symantec Mobility: Suite makes mobility manageable and secure, integrating mobile device management (MDM), mobile application management (MAM), and threat protection into one centrally controlled console.  Mobility Suite 5.1 delivers enhancements for both administrators and end-users. 

Feature Highlights

Improved MDM

  • Expanded certificate support with Microsoft Certificate Authority for iOS
    • Integration with Microsoft CA for...
Ryan Terry | 06 Oct 2014 | 5 comments

VIDEO: Introducing Symantec Mobility: Suite

Today mobility offers ‘any device, any time, any place’ productivity, appealing to both enterprises and employees.  However, that flexibility comes with challenges – protecting corporate data on devices, separating personal and corporate information, managing diverse operating systems, and preventing devices and apps from becoming another attack vector.

With Symantec™ Mobility: Suite (v.5.0), available today, customers can now rely on a single unified solution of control that enforces consistent security standards, regardless of device type, without impeding the end user’s productivity or personal privacy. Mobility Suite simplifies mobility management, integrating mobile device management (MDM), mobile application management (MAM) and mobile threat protection into one comprehensive, single console solution. Whether a user’s environment is...

MelanieLopez | 01 Oct 2014 | 0 comments

We’re happy to share that Symantec was named a Leader in the Forrester Wave™: Enterprise Mobile Management, Q3 2014! The research conducted by Forrester Research, Inc. evaluated Symantec and 14 other vendors against 27 criteria for current offering, strategy, and market presence.

Symantec was identified as one of ten vendors that “lead the pack.” The leaders were noted for separating ourselves from other vendors by introducing a strong security background without disruption for the employee. Forrester defines Leaders as balancing OS, application, and data management functionality while providing flexible container options and productivity applications, and have demonstrated a strong vision and roadmap to help customers as they bring their PC and mobile management strategies together.

Symantec received a high score overall in the current offering category, and the highest possible score for App Security. Forrester Research noted Symantec for the...

Solange Deschatres | 22 Sep 2014 | 0 comments

Information for this post was provided by Maribel Lopez, Principal and Founder of Lopez Research, which provides market research, visionary keynotes, strategic consulting services and partnership development services.

classroom.jpgEmployers who’ve embraced Bring Your Own Device (BYOD) programs do so anticipating a more nimble workforce; employees being reachable everywhere, collaboration across geographies, and less company-owned hardware to purchase. While employees enjoy the freedom to use their own device, organizations sometimes fail to properly cover all of the necessary staff training that accompanies a BYOD program. Similarly, emails to employees regarding the changes BYOD brings or a buried/confusing policy can be missed, leading employees to fail to...

CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Solange Deschatres | 23 Jun 2014 | 0 comments

BYOD vs CYOD.jpegThe last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature.

But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every evening, and what happens to it off-site often has IT staff pulling their hair out. According to Osterman Research, 15% of employees...

Matthew Nelson | 23 Apr 2014 | 0 comments

More and more organizations around the globe permit employees to bring their own mobile devices to work so they can access company data from any location at any time with any device. The bring your own device (BYOD) phenomenon started gaining traction around 2007 when executives and board members brought the first personal smart phones and tablets into the corporate workspace. Since then, the BYOD trend has skyrocketed as employees began to expect the same kind of flexibility and employers saw increased productivity by allowing employees to use mobile devices both at work and home.

Employee and Employer Attitudes

Cisco recently revealed that 95% of IT and business leaders surveyed in the United States say their organizations permit employee-owned devices in some way, shape or form. The survey goes on to cite employees’ desire to use their...

CherylTang | 20 Feb 2014 | 0 comments


Mobility is a reality of today’s business environment. Look around and you’ll see people working on smartphones and tablets at coffee shops, on trains, planes and yes, even at their kids’ soccer games. While mobility is a boon for employee productivity, it has created security and management challenges for IT organizations.

Many companies turned to Mobile Device Management (MDM), expecting it to be a panacea for enterprise mobile security, only to find that relying solely on MDM was simply not enough. While MDM is important, there is more to an enterprise mobility strategy than just managing devices. Enter Mobile Application Management (MAM). Today, companies are broadening their mobile strategy to include developing, deploying, securing and managing mobile apps.

If you’re wondering whether you need to...

Swarna | 29 Sep 2013 | 4 comments

The much-awaited iOS 7 is here.   With iOS 7, Apple introduced advanced functionality with iOS7, not just for consumers but also for enterprise users.  For consumers, capabilities such as enhanced camera options, ease of multitasking, photo library, control center, notification center, AirDrop and AirPrint, to name a few, are fantastic. They make it really easy for me to share information and be productive.

However, along with the advanced feature set comes additional security gaps that will be of greater concern for many enterprises.  As the leader in security, this is where it makes our job even more exciting. Our first goal is to secure those glaring new security gaps that come with iOS 7.

Let me explain.

Apple introduced AirDrop on Macs two years ago with OS X Lion for Mac users to transfer files directly without...