Why you need security experts to help with mobile device management [Symantec]

With more employees are bringing their personal mobile devices into work and expecting to use them —  an additional layer of security is needed to protect the corporate network.

But comparing mobile security to desktop security is like comparing apples to oranges. With so many different devices (and different versions of those devices) coming into an organization, security can get complicated.

So when it comes to securing mobile devices, it means enforcing security policies by managing the devices’ native security functionality (which is the case for Apple, Android and BlackBerry, while Windows Mobile and Symbian have specific third-party agents available).

But there are a lot of misconceptions about mobile security that can lead to a false sense of how secure your organization really is. Here are a few of the most common myths surrounding mobile security: [Read more…]

Mobile device management is easier with Symantec

Symantec Mobile Device Management

Gone are the days when everyone was armed with a company-issued Blackberry that could easily be managed through the Blackberry Enterprise Server. These days, consumerization of IT is a trend that’s saddling many companies with a variety of manageability issues. After all, IT just can’t have the breadth of knowledge required to manage it all – iPhones, Androids, PlayBooks and webOS devices.

It also carries the burden of supporting and enforcing user productivity. Mobile applications need to connect to the enterprise back-end and vice-versa. Mobile devices are becoming more and more sophisticated, providing greater corporate access and storing even more data. Add to that, many organizations are under PCI or HIPPA regulations, which may be extended to mobile devices, and it’s clear that a framework needs to be developed to address all these issues and safely allow communication between networks and devices.

Symantec’s Mobile Management does just that – addressing these concerns and enabling organizations to embrace mobile computing while enforcing governance, securing corporate data and gaining visibility and control over all mobile platforms. Administrators finally have the ability to centrally define and distribute security policies to devices over-the-air using the device’s native security technology instead of adding security technology to the device itself.

“Symantec’s mission is to secure people and information through identity, protection and context, and our broad approach to mobile security and management is a key extension of protection for all of our customers,” says Symantec’s Group President, Enterprise Products, Francis deSouza. “By providing mobile security and management for smart devices, we’re making it easier for enterprises to allow their employees to use their device of choice without putting corporate data at risk.”

There are four key areas where Symantec really shines:

  1. Device management allows application updates and patches to be performed without needing the device physically present. Management can also be integrated with help desk for user support as well as remote wipes.
  2. Device security prevents unauthorized usage of the device and features enforcement policies around password protection. It’s peace of mind so the device doesn’t fall prey to data loss.
  3. Content security uses application control to guard against malware and protect data from unauthorized usage.
  4. Identity and access provides access to the right resources from the right devices with the right postures through authentication and authorization for access to enterprise applications and resources.

Does your organization need a mobile device management solution?

Mobile devices offer exciting new possibilities in the office, on the road or anywhere people are getting their jobs done. Our team of security experts are always here to help you.

How the Employee Choice model for mobile devices can be easily managed with the right partners [Apple]

The traditional model of “one computer fits all” within an organization is shifting. Even the effort of selecting a desktop or laptop standard per user role or department does not offer the flexibility that today’s tech-savvy worker is demanding from their employer. Started with mobile devices (smartphones and tabl… ok, let’s be honest: iPads) the phenomenon has trickled into the core client computing systems, manly laptops.

What’s the incentive for businesses to encourage this behaviour? Organizations that have adopted this model find more happy and productive workers when you allow them to choose the platform they want to work on. It’s also a strong recruitment tool to get the best and brightest talent onboard. The era of “This is your beige box, this is your black phone” from one company is being challenged with “Would you prefer a Mac or Windows computer? iPhone or Blackberry?” by their competition. And today’s Datacenter infrastructure definitely has the guts to run run virtual desktops and applications in these scenarios – just ask our own Jonathan White.

However beneficial this policy may be to recruit and retain talent, IT Managers and CIOs are frustrated with the lack of security on a “rogue” device entering their infrastructure. Counting on a personal computer’s uptime when the manufacturer is not the company’s standard can also be a pain; [Read more…]