Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with Mobile
Showing posts in English
Symantec Analyst Relations | 12 Dec 2011 | 0 comments

Blog by Robert Mol, Director Product Marketing EMEA:

I’m currently defining some interesting debate topics for a “Consumerization of IT” roundtable discussion taking place in Brussels on December 2nd. This debate, which will be joined by a group of enterprise IT executives may well become a very lively debate on priorities, or we may find the usual reluctance to discuss the rather typical analyst assessment of the market for mobile technologies.

Read more here: What comes first “Management or Security?”

Symantec Analyst Relations | 23 Nov 2011 | 0 comments

Symantec is the leading mobile security provider of unified customer protection for the corporate, enterprise and individual mobile user. Next Generation Network Protection offers comprehensive proactive protection from the increasingly prominent threat of mobile viruses, malware, inappropriate content, unsolicited communications and spam at a corporate and consumer level – right in carrier networks. This is part of a service hierarchy that delivers unified protection and revenue generating services across all mobile and wireless bearers, for all technologies including messaging, internet and voice usage.

Download the whitepaper by clicking on the link below.

GregDay-SecurityCTO | 23 Nov 2011 | 0 comments

While innovation is, by its nature, about creating capability, its true potential comes only when people and businesses adopt new technologies. With the best will in the world, in general this process is haphazard - nobody has advance knowledge of what will be accepted into the mainstream, either in terms of broad categories or specific instances.

Right now for example we are seeing the continued rise of the smart phone. Despite being initiated by Blackberry, catalysed by Apple and reinforced by Microsoft, Google's Android has come from nowhere to become the world's most used mobile operating system. Asking how Google achieved this is the wrong question, because it's unlikely anyone could replicate the steps - all we can really do is understand how it happened, in terms of the company's decisions and the contextual factors involved. 

...

Symantec Analyst Relations | 13 Oct 2011 | 0 comments

Symantec released its Mobile Management 7.1 offering in September.  Mobile Management is at the baseline of any mobile initiative, aiming at securing and managing information on mobile devices, and offering a platform for leveraging new business models and a smarter workplace for the future.

Please note the Mobile resources Symantec has on offer:

Jon C | 15 Aug 2011 | 0 comments

There seems to be a little disagreement on the Interweb about the meaning of the term "BYOA". To be fair, it was inevitable that the "BYO" tag, having been successfully applied to BYOPC (bring your own PC), would find greater use beyond the domain of desktops and laptops. Indeed the more generic term BYOD could be seen as a more accurate reflection of the growing numbers of non-corporate mobile devices in use in business situations.

More recently BYOA has emerged, with the "A" representing "App". It's the "B" that's causing contention - meaning "Bring" or "Build" depending on where you look.

From a security and compliance perspective, neither bodes particularly well. Anyone old enough...

Symantec Analyst Relations | 09 Aug 2011 | 0 comments

Examining the security approaches employed in Apple’s iOS and Google’s Android

The mass-adoption of both consumer and managed mobile devices in the enterprise has increased employee productivity but has also exposed the enterprise to new security risks. The latest mobile platforms were designed with security in mind—both teams of engineers attempted to build security features directly into the operating system to limit attacks from the outset. However, as the paper discusses, while these security provisions raise the bar, they may be insufficient to protect the enterprise assets that regularly find their way onto devices. Finally, complicating the security picture is the fact that virtually all of today’s mobile devices operate in an ecosystem, much of it not controlled by the enterprise—they connect and synchronize out-of-the-box with third-party cloud services and computers whose security posture is potentially unknown and outside of the...

Jon C | 24 May 2011 | 0 comments

In this industry it's not so hard to spot the changes as they happen: what's harder is to do something about them, given what's already in place. Technology is presenting organisations large and small with new opportunities, but also creates new challenges and pressures which might be easy to fix if those in charge had the chance to start with a clean sheet of paper.

Nowhere is change having more impact than in security and risk management. When the Jericho Forum was set up in 2004, its goal was to look at the challenges faced around 'de-perimeterisation' - that is, what does security need to become when the perimeter of the organisation starts to weaken based on how people are using IT? A question which has become a self-fulfilling prophecy.

Seven years later, for many organisations the perimeter has gone completely. Cloud computing, the umbrella term we use to describe internet-based applications and services, has arrived on the technological...