Video Screencast Help
Managing Mobility
Showing posts tagged with MAM
Showing posts in English
ctang | 20 Feb 2014 | 0 comments

 

 

Symantec-Evergreen-Oct-MobilityCON-Group.jpeg

Mobility is a reality of today’s business environment. Look around and you’ll see people working on smartphones and tablets at coffee shops, on trains, planes and yes, even at their kids’ soccer games. While mobility is a boon for employee productivity, it has created security and management challenges for IT organizations.

Many companies turned to Mobile Device Management (MDM), expecting it to be a panacea for enterprise mobile security, only to find that relying solely on MDM was simply not enough. While MDM is important, there is more to an enterprise mobility strategy than just managing devices. Enter Mobile Application Management (MAM). Today, companies are broadening their mobile strategy to include developing, deploying, securing and managing mobile apps.

If you’re...

Swarna | 29 Sep 2013 | 4 comments

 

The much-awaited iOS 7 is here.   With iOS 7, Apple introduced advanced functionality with iOS7, not just for consumers but also for enterprise users.  For consumers, capabilities such as enhanced camera options, ease of multitasking, photo library, control center, notification center, AirDrop and AirPrint, to name a few, are fantastic. They make it really easy for me to share information and be productive.

However, along with the advanced feature set comes additional security gaps that will be of greater concern for many enterprises.  As the leader in security, this is where it makes our job even more exciting. Our first goal is to secure those glaring new security gaps that come with iOS 7.

Let me explain.

Apple introduced AirDrop on Macs two years ago with OS X Lion for Mac users to transfer files...

Will Redfield | 06 Dec 2012 | 0 comments

This post first appeared on the website of Mobile Enterprise Magazine.

While it is true that the design of some aspects of mobile device operating systems afford better in-built security against certain types of malware, it is a mistake to assume mobile devices are impenetrable. Believing they are lacks foresight.

In fact, the current state of mobile malware is reminiscent of the early days of computer security as whole. In those early days, many believed that simply practicing “safe surfing” would be a sufficient countermeasure.

...