Home Security Symantec beefs up mobile threat protection

Symantec has updated multiple components of its enterprise mobility management products, uniting the various technologies into a single system.

Responding to the still-growing use of mobile devices at work and the desire (and in some cases the necessity) to manage them centrally in order to protect corporate assets, Symantec CTO Amit Mital claimed "Symantec is the first company to integrate mobile device management, app wrapping, threat protection, and email client and browser apps into one enterprise mobility management solution.

"Across the enterprise, our security pedigree, unique intelligence insights and unparalleled ability to deliver comprehensive solutions set us apart. And we're replicating that in the mobile space so our customers can give their employees the tools they need to remain productive, while ensuring the right security controls are in place to protect critical information."

Company officials pointed to multiple components in the company's mobile portfolio that have been developed, updated or integrated to improve defences against mobile threats.

They include the integration of Norton Mobile Security and App Centre with a single console; Symantec Sealed (application wrapping for licensed or in-house apps); Norton Mobile Insight (scans new apps in more than 200 stores to determine potential security risks, privacy risks and intrusive behaviour); Email Gateway (to isolate Exchange servers from mobile attacks); Secure App Proxy (secure per-application access to corporate resources); Partner APIs (allowing third-parties to integrate their products with App Centre); Push authentication (for one-click VPN connections); and Norton Spot (a beta app that reports potential threats in Android apps before they are download from Google Play).

The company also foreshadowed the incorporation of secure email technologies Symantec gained from the acquisition of NitroDesk in order to provide its customers with an alternative to BlackBerry.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect