Symantec has extended its mobile device security strategy, adding new features and enhancements aimed at improving the security and efficiencies associated with mobility, and particularly the bring-your-own-device (BYOD) phenomenon.
The company used its Symantec Vision 2012 conference as the backdrop for the announcement where a number of key highlights are under discussion.
In the area of mobile application management, Symantec’s acquisition of Nukona enables cross-platform mobile application management that can protect corporate applications and related data.
"This is a different technology category from mobile device management,” explained Brian Duckering, senior manager for enterprise mobility at Symantec.
“Rather than managing the device for applying policies, we can target specific applications and data with authentication, encryption, controls etc. so that company resources are controlled and private resources that belong to the employee are not."
"This is a game changer for enterprise mobility," Duckering added. "People prefer to use their own devices, they treat them better because they paid for them, and their willingness to do so saves money for the company."
Although it has the potential to lower a company’s bottom line, enterprise mobility, in particular, has been difficult for organisations working with highly sensitive information to find a secure means by which to work with BYOD.
"It becomes challenging when those devices are accessing sensitive company resources, and security policies can become pretty onerous. This is especially true when you look at industries like healthcare and finance and government," Duckering notes.
"So the policies that they would put in place can be more restrictive than the employees would prefer to permit."
That’s where mobile application management steps in, providing a possible solution to the BYOD headache.
"Mobile application management allows you to apply all of the appropriate controls within the individual applications, or a small set of particular applications," said Duckering.
"So if I don't have a password for my device for example, I don't have to have one, but as soon as I go to the application in question, I need to login. And any company stored on the device would have to be encrypted."
These capabilities are now available for both SaaS and on-prem business models, based on the selection of the respective customers and channel partners.
Tablets and mobiles
Symantec Data Loss Prevention (DLP) for tablets has now been re-flagged as Data Loss Prevention for mobile, and will soon support the iPhone. The solution enables monitoring and control of confidential data from mobile devices without restricting users’ access to applications.
Data Loss Prevention for mobile, with iPhone support is scheduled for general availability in late summer. Android support is also on the horizon, but an effective date has not yet been announced.
Symantec Certificate Intelligence Center (CIC) for mobile is designed to simplify the process of managing SSL certificates across large and complex networks. Detailed, real-time intelligence on SSL certificate usage on the network is now available on the iPad.
Symantec Code Signing for Android provides a tool for developers to digitally sign their .APK files for the Android platform. In addition to signing applications, this cloud-based service allows developers to securely manage their certificate keys and store their signed applications from a single console. Android Root certificate capability is also available.
“This is pretty key because one of the major exploits is to get a copy of the application, modify it and then redistribute it,” said Symantec's Duckering. “For example, last year people were finding free applications of a popular game that worked fine but also had malicious code on them. The users later found out that their devices were sending high-value text messages and doing other things.”
This article originally appeared at crn.com
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.