Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with mobile security
Showing posts in English
tgrandpre | 17 Mar 2014 | 0 comments

Mobile World Congress was an exciting time for Symantec this year, with so much constructive engagement taking place with many of you from the analyst community, particularly around the key areas of Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Security and Enterprise File Synchronization and Sharing (EFSS).

From my conversations with you, what really seemed to catch your attention were the advances we’ve been making in mobile as a whole. The overall integration between MDM and MAM – and broader solutions that enhance our mobile offerings – many of you agreed were taking things in a new direction.

Most of you seemed more than familiar with Norton Zone already, but it might be worth a quick recap here. Norton Zone is our secure sync and file technology – a personal cloud service that lets users safely share files from your computer, smartphone and tablet. Many of our...

Symantec Analyst Relations | 19 Dec 2011 | 0 comments

Blog by Robert Mol, Director Product Marketing EMEA:

About a week ago I hosted an Executive Round Table on Consumerization of IT. Just outside the city of Brussels, Belgium a group of Enterprise customers from a variety of industries gathered for what can only be described as a Round Table with gastronomic excellence. After a gracious opening by our host and a last sip of the finest bubbly, my focus turned to discovering the perception of our guests on the Mobile Solutions and Services market. My primary question? Do they recognize the same explosive and disruptive change in the adoption of Mobile devices as presented by the analyst community and what are their key concerns? With representation from the Finance sector, Healthcare, Government, and Media,  this was looking to become a lively afternoon with likely very different perceptions amongst these senior IT leaders.

Read more here: ...

Symantec Analyst Relations | 09 Aug 2011 | 0 comments

Examining the security approaches employed in Apple’s iOS and Google’s Android

The mass-adoption of both consumer and managed mobile devices in the enterprise has increased employee productivity but has also exposed the enterprise to new security risks. The latest mobile platforms were designed with security in mind—both teams of engineers attempted to build security features directly into the operating system to limit attacks from the outset. However, as the paper discusses, while these security provisions raise the bar, they may be insufficient to protect the enterprise assets that regularly find their way onto devices. Finally, complicating the security picture is the fact that virtually all of today’s mobile devices operate in an ecosystem, much of it not controlled by the enterprise—they connect and synchronize out-of-the-box with third-party cloud services and computers whose security posture is potentially unknown and outside of the...