1. /
  2. Products & Solutions/
  3. Mobile Solutions/
  4. BYOD (Bring Your Own Device)

BYOD (Bring Your Own Device)

Support Bring Your Own Device initiatives confidently with advanced application protection.
Say yes to BYOD with confidence
Say yes to BYOD.
A Bring Your Own Device policy doesn’t have to be scary. With the right tools it is possible and practical to:
  • Support user-owned devices.
  • Protect devices across public and private networks.
  • Allow devices into highly-regulated environments.
WHITE PAPER
BYOD or Bust
WHITE PAPER
BYOD or Bust
Are Your Mobile Policies Keeping Up with Your Mobile Employees?
Read the white paper
VIDEO
Enabling BYOD with a Complete Mobile Adoption Strategy (4:32)
Define a complete mobile adoption strategy with employee productivity and satisfaction.

BYOD

Bring Your Own Device is all the rage, but it’s scary too. Many companies are looking to mobile applications as the next frontier of productivity and competitive advantage. And leveraging devices that employees already own and know how to use effectively seems to be a smart way to go. But if they are not accepting of the controls imposed to protect corporate data, your initiatives will go nowhere.

Solution

A powerful strategy to address the complex BYOD issues is to focus on the source of concern, the data itself and the applications that access it. Instead of trying to control the entire device, you can intelligently apply controls to individual applications, without touching or affecting the rest of the device or the users’ personal stuff.
Note that considerations must be made for both native apps, those installed on the device itself, and cloud apps and services, those accessed directly from the mobile device, typically with no corporate visibility. For native apps, controls and security policies may be applied directly to each app, according to the regulations and risk tolerance around the data being accessed, stored and transmitted. This avoids having to apply policies broadly over the entire device and potentially creating liability and privacy issues over personal assets. For cloud apps, an identity-controlled portal may be established for business use of these services, adding a layer of visibility and control, without impeding the productivity inherent to the cloud. Single sign-on functionality will simplify access for the users and allow IT organizations to control, limit and revoke access to third party apps and services from a central console.

Symantec Products that Support BYOD

Symantec Mobile Management Suite

A single SKU for all common mobile use cases. Includes:
  • Symantec Mobile Management
  • Symantec Mobile Management for Configuration Manager
  • Symantec App Center
  • Symantec Mobile Security

Symantec Mobile Management

Configuration control, inventory, policy deployment, app and content distribution. To plug into the Symantec Management Platform or for stand-alone implementations.

Mobile Security

Anti-malware, threat protection, reputation-based browsing.

Data Loss Prevention for Mobile

Monitoring, notification and blocking of sensitive data originating from mobile devices.

Symantec Managed PKI Service

Certificate management for secure access to corporate resources from mobile devices.