Thanks for posting this. Norton Mobile Security offers some protection against this vulnerability. Enterprise management for NMS is available through Mobility. This can be integrated into most MDM solutions. The specific benefit of NMS is mitigation by URL filtering and reporting of the device OS. There is no "patch" for this vulnerability through NMS, only through Google. It will scan for known malware which this vulnerability will be used to deliver.
How can we identify a device that has been compromised? For example, with a business managing 10k plus devices the probability is high that some will be compromised. We need to deploy some kind of DLP for applications through a Secure App Proxy. For our own applications like Work Mail, touchdown, Work file, work web etc... communication can be proxied and monitored for suspicious traffic. Sandboxing applications will be key. Check out our project Red Onion, it is an SDK for just this kind of situation for 3rd party developers.
No specific signature is directory associated with this vulnerability. Ultimately the administrator will need to decide how to act on the telemetry received from the NMS agent.