SlideShare una empresa de Scribd logo
1 de 14
Symantec Enterprise
Mobility Enhancements

Briefing Summary
BYOD Success = Mastering BYOD Control Points




   Devices         Apps               Data




                           …without disrupting user experience

                                                             2
BYOD Adoption Map
                                                              BYOD
 Unmanaged




             Company Owned But Unmanaged        Company Controls Relevant Apps & Data Only
 Managed




             Company Controls Standard Device       Company Controls Personal Device


                   Company-owned                        Personally-owned


                                                                                             3
Symantec Enterprise Mobility Solutions
    ❶                       ❷                                          ❸




          Threat                  Device           User & App               App & Data
        Protection              Management        Access Mgmt.              Protection

       Mobile security          Configuration,   Company credentials       Corporate data
     threat detection and        control and      extended to both         separation and
           removal              management of     public and private        delivery of IT
                                mobile devices     cloud services             services



        Mobile Security     Mobile Management     Managed PKI & O3     Nukona App Center




                                                                                             4
Announcement Summary

• Enhancements to Enterprise Mobility Portfolio
    – Mobile Security
         • New Symantec Mobile Security for Android
         • Symantec PGP Viewer for Android
    – Device Management
         • Symantec Mobile Management
         • New Symantec Mobile Management for Config Manager
    – Application Management
         • Nukona App Center from Symantec
Mobile Security
• Malware is a problem on Android devices
  – 400% growth in the incidence
  – 67% of enterprises mentioned it as concern


• Symantec provides enterprise grade protection
  – Anti-malware with live updates
  – Safe-browsing experience
  – Anti-theft features


• Symantec Mobile Security is different because
  – Supported by SYMC Global Intelligence Network
  – Monitors 70+ app stores and 3 million plus apps
  – Opt-in information from millions of devices
Device Management
• Android’s general market share hasn’t translated into enterprise
  – Security and Management not as straight forward as iOS
  – Platform and device fragmentation, lack of controls


• Symantec provides consistent enterprise management
  – Native MDM features with policy management
  – Internal app store for apps and documents
  – Secure email, with Nitrodesk Touchdown


• Symantec Device Management is different because
  – Its built on a proven management system
  – It can provide unified endpoint management
Device Management for SCCM
• Mobile is being managed as a silo
  – Point products make mobile projects inefficient
  – Enterprise integration for security and management is important


• Symantec provides integrated mobile management
  – Completed integration of Odyssey acquisition
  – Now provides mobile management for Microsoft SCCM


• Symantec Device Management is different because
  – One of the only products to provide comprehensive MDM from SCCM
  – It enables faster time to value and lowers TCO
Application Management
• Mobile Data Apps and Data need to meet compliance requirements
  – Device Management products are limited in capabilities
  – Application level protection is needed


• Symantec Application Management enhancements
  – Makes iOS apps more secure with FIPS encryption
  – Application Management now available for Android


• Symantec Application Management is different because
  – Cross-platform multi-application protection
Symantec Enterprise Mobility Solutions
    ❶                       ❷                                          ❸




          Threat                  Device           User & App               App & Data
        Protection              Management        Access Mgmt.              Protection

       Mobile security          Configuration,   Company credentials       Corporate data
     threat detection and        control and      extended to both         separation and
           removal              management of     public and private        delivery of IT
                                mobile devices     cloud services             services



        Mobile Security     Mobile Management     Managed PKI & O3     Nukona App Center




                                                                                             10
Symantec for Mobile


• Only vendor to provide protection at device,
  application and data level
  – Needed to address diverse enterprise use cases
  – Rest of the vendors solve only bits and pieces


• Only vendor to provide comprehensive and
  integrated mobile management
  – Needed to solve inefficiencies in mobile projects
  – Rest of the products in market are point solutions
Product Availability

• Timelines
  –   Mobile Security                        - Now
  –   Mobile Management                      - Now
  –   Mobile Management for SCCM             - Now
  –   Application Management                 - Now
                                                                  Enterprise
  –   PGP Viewer for Android                 - Now
                                                                  Mobility
                                                                  Solutions
• Go To Market
  – Sold through Symantec’s channel
  – Globally available
  – Perpetual and Subscription license models (priced per-seat)
Enterprise Mobility – Additional Resources
• Resources
  – Symantec Mobile Solutions
  – Research: 2012 State of Mobility Survey
  – Research: A Window Into Mobile Device Security
  – Research: Motivations of Recent Android Malware
  – Symantec acquires Odyssey Software and Nukona
Thank you!




Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Más contenido relacionado

La actualidad más candente

Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
Thuan Ng
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 

La actualidad más candente (20)

Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 

Similar a Symantec Enterprise Mobility Enhancements

Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 

Similar a Symantec Enterprise Mobility Enhancements (20)

Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 

Más de Symantec

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Symantec Enterprise Mobility Enhancements

  • 2. BYOD Success = Mastering BYOD Control Points Devices Apps Data …without disrupting user experience 2
  • 3. BYOD Adoption Map BYOD Unmanaged Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Managed Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 3
  • 4. Symantec Enterprise Mobility Solutions ❶ ❷ ❸ Threat Device User & App App & Data Protection Management Access Mgmt. Protection Mobile security Configuration, Company credentials Corporate data threat detection and control and extended to both separation and removal management of public and private delivery of IT mobile devices cloud services services Mobile Security Mobile Management Managed PKI & O3 Nukona App Center 4
  • 5. Announcement Summary • Enhancements to Enterprise Mobility Portfolio – Mobile Security • New Symantec Mobile Security for Android • Symantec PGP Viewer for Android – Device Management • Symantec Mobile Management • New Symantec Mobile Management for Config Manager – Application Management • Nukona App Center from Symantec
  • 6. Mobile Security • Malware is a problem on Android devices – 400% growth in the incidence – 67% of enterprises mentioned it as concern • Symantec provides enterprise grade protection – Anti-malware with live updates – Safe-browsing experience – Anti-theft features • Symantec Mobile Security is different because – Supported by SYMC Global Intelligence Network – Monitors 70+ app stores and 3 million plus apps – Opt-in information from millions of devices
  • 7. Device Management • Android’s general market share hasn’t translated into enterprise – Security and Management not as straight forward as iOS – Platform and device fragmentation, lack of controls • Symantec provides consistent enterprise management – Native MDM features with policy management – Internal app store for apps and documents – Secure email, with Nitrodesk Touchdown • Symantec Device Management is different because – Its built on a proven management system – It can provide unified endpoint management
  • 8. Device Management for SCCM • Mobile is being managed as a silo – Point products make mobile projects inefficient – Enterprise integration for security and management is important • Symantec provides integrated mobile management – Completed integration of Odyssey acquisition – Now provides mobile management for Microsoft SCCM • Symantec Device Management is different because – One of the only products to provide comprehensive MDM from SCCM – It enables faster time to value and lowers TCO
  • 9. Application Management • Mobile Data Apps and Data need to meet compliance requirements – Device Management products are limited in capabilities – Application level protection is needed • Symantec Application Management enhancements – Makes iOS apps more secure with FIPS encryption – Application Management now available for Android • Symantec Application Management is different because – Cross-platform multi-application protection
  • 10. Symantec Enterprise Mobility Solutions ❶ ❷ ❸ Threat Device User & App App & Data Protection Management Access Mgmt. Protection Mobile security Configuration, Company credentials Corporate data threat detection and control and extended to both separation and removal management of public and private delivery of IT mobile devices cloud services services Mobile Security Mobile Management Managed PKI & O3 Nukona App Center 10
  • 11. Symantec for Mobile • Only vendor to provide protection at device, application and data level – Needed to address diverse enterprise use cases – Rest of the vendors solve only bits and pieces • Only vendor to provide comprehensive and integrated mobile management – Needed to solve inefficiencies in mobile projects – Rest of the products in market are point solutions
  • 12. Product Availability • Timelines – Mobile Security - Now – Mobile Management - Now – Mobile Management for SCCM - Now – Application Management - Now Enterprise – PGP Viewer for Android - Now Mobility Solutions • Go To Market – Sold through Symantec’s channel – Globally available – Perpetual and Subscription license models (priced per-seat)
  • 13. Enterprise Mobility – Additional Resources • Resources – Symantec Mobile Solutions – Research: 2012 State of Mobility Survey – Research: A Window Into Mobile Device Security – Research: Motivations of Recent Android Malware – Symantec acquires Odyssey Software and Nukona
  • 14. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Notas del editor

  1. Symantec Fosters Secure Mobile Deployments and Application Initiativeswith Key Android and iOS Enhancements
  2. Symantec is announcing a number of specific enhancements and extensions to its Enterprise Mobility Portfolio to enhance the security, manageability, and efficiency of mobility in the enterprise.