Integrated Voice and Data Operations
Mobile Device Management

The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. We will consider the implications of mobile computing within the workplace and look at how implementing the right strategy, developing the right policies and choosing the right solutions can help an organisation leverage BYOD potential while protecting valuable business assets. Key content will include an overview of the benefits of Mobile Device Management (MDM) and Mobile Application Management (MAM) solutions and how these can be combined.

BYOD

Bring Your Own Device is all the rage, but it’s scary too. Many companies are looking to mobile applications as the next frontier of productivity and competitive advantage. And leveraging devices that employees already own and know how to use effectively seems to be a smart way to go. They are not accepting of the controls imposed to protect corporate data, your initiatives will go nowhere

Solution A powerful strategy to address the complex BYOD issues is to focus on the source of concern, the data itself and the applications that access it. Instead of trying to control the entire device, you can intelligently apply controls to individual applications, without touching or affecting the rest of the device or the users’ personal information.

Note that considerations must be made for both native apps, those installed on the device itself, and cloud apps and services, those accessed directly from the mobile device, typically with no corporate visibility. For native apps, controls and security policies may be applied directly to each app, according to the regulations and risk tolerance around the data being accessed, stored and transmitted. This avoids having to apply policies broadly over the entire device and potentially creating liability and privacy issues over personal assets. For cloud apps, an identity-controlled portal may be established for business use of these services, adding a layer of visibility and control, without impeding the productivity inherent to the cloud. Single sign-on functionality will simplify access for the users and allow IT organizations to control, limit and revoke access to third party apps and services from a central console.

Solutions to support BYOD

There are many solutions available and considerations should include whether managed or unmanaged services are needed, the separation of corporate and personal information required and the impact of cloud services.

Mobile Device Management (MDM)

This solution enables the remote administration and enrolment of managed mobile devices. Typical security policies might include setting password strength, configuring VPN settings, specifying screen lock duration and disabling specific app functions (such as access to App stores) to prohibit potentially risky behaviour. In addition, administrators can perform security operations such as locating or wiping lost or stolen devices.

Mobile device management solutions don’t specifically protect against any risk category. However, the ability to remotely configure the device, for example to block all new apps, can help eliminate the introduction of malware and also limit resource abuse, integrity threats and intentional (or unintentional) data loss.

Separation of personal and corporate data can also be achieved with an agent based mobile device management solution as the removal of the agent itself will only affect corporate data and applications. Mobile device management is typically considered by organisations in need of a comprehensive mobile solution that incorporates a corporate app store and shared document libraries. It allows for a broader approach to productivity than merely providing access to email and calendar, which is the most common level of mobile access today.

Symantec solutions

Symantec offers a wide choice of mobile computing product solutions designed to support businesses in their strategic objectives.

Mobile Device Management

Symantec™ Mobile Management

Delivers over-the-air deployment of applications and updates, device health monitoring and complete lifecycle management of mobile devices to increase IT efficiency and user productivity. Symantec Mobile Management integrates with Microsoft System Center Configuration manager and Altiris Client Management.

Mobile Application Management


Symantec App Center

Provides secure Mobile Application Management (MAM) capabilities for native mobile apps. MAM products are used to manage the growing needs of enterprises to manage and secure mobile applications, particularly in BYOD environments.

Information Protection when mobile


Symantec Mobile Security

Advanced device security including reputation based security for Android™ and Windows® Phone. Symantec Mobile Security will be available later this year.

Symantec™ Data Loss Prevention for Mobile

Monitors and protects sensitive data sent from iPad and iPhone® mail clients, browsers, and apps, such as Facebook, Twitter and Dropbox. Unlike other solutions that restrict users from accessing apps and files on their iPads and iPhones, Data Loss Prevention for Mobile enables secure use of sensitive data without stopping business.

Symantec Verisign Identity Protection (VIP) Access for Mobile

Verifies user identity by generating a unique security code or one time password and turns a mobile phone into a strong two-factor authentication security device, eliminating the need for additional security hardware.

Symantec™ Managed PKI

Cloud-based service to power strong authentication, encryption, and digital signing of applications.

Symantec PGP Mobile

Comprehensive email and data encryption solution for Windows Mobile smartphones and data cards.

Symantec PGP iOS viewer

Decrypts encrypted email attachments on iOS devices directly and enrols them for key management.