Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Symantec Delivers Complete Mobile Device Lifecycle Management

Symantec announces its mobile security and management strategy
  • 16 December, 2009 18:09

<p>Symantec Delivers Complete Mobile Device Lifecycle Management</p>
<p>Mobile Solutions Combine Security and Management Capabilities to Help Customers Protect and Manage Corporate Data on Mobile Devices</p>
<p>Sydney, AUSTRALIA - 16 December 2009 – Symantec Corp. (Nasdaq: SYMC) today announced its mobile security and management strategy, including three products to help organisations secure and manage data on the rising number of mobile devices in the enterprise. Symantec’s mobile strategy focuses on the effective integration of its mobile security and management solutions to help customers reduce downtime, increase user productivity, improve response time and provide protection and management throughout the mobile device lifecycle – from provisioning and management to security and eventual device retirement.</p>
<p>“As mobile devices become more sophisticated, provide greater corporate access and store more data, organisations require greater control and management to protect corporate information and ensure user productivity – all while reducing costs,” said Art Gilliland, vice president, Enterprise Security Group, Symantec. “Our mobile strategy is designed to protect and manage data wherever it resides and automate procurement and provisioning, provide ongoing maintenance and protection, and quickly retire the mobile devices if they are lost, damaged, stolen or replaced.”</p>
<p>Having a comprehensive mobile strategy in place will become increasingly important as mobile devices continue to permeate the business environment. IDC research indicates that the number of worldwide converged mobile device shipments will reach more than 167 million by the end of 2009 and forecasts that it will increase to more than 291 million by 2013, representing a 14 percent Compound Annual Growth Rate(1). As more mobile devices access corporate networks, often through unprotected pathways, malware writers and criminals will use this window to gain access to sensitive data.</p>
<p>“Mobile devices and the growing number of people using them are becoming a bigger target for unauthorised and potentially harmful software, including worms, viruses, and spyware,” said Sean Ryan, Research Analyst, Mobile Enterprise Software at IDC. “As the sheer number of mobile devices continues to increase and demands on IT continue to increase, the need for organisations to secure and manage these devices and the information on them is significantly elevated.”</p>
<p>Symantec’s mobile management and security strategy follows a lifecycle model, provides tight integration and aligns with the broad Symantec portfolio. As part of its mobile strategy, Symantec is now offering three new products to help customers mitigate risk, manage complexity, control costs, automate processes and address compliance concerns with efficiency and cost savings.</p>
<p>• Symantec Endpoint Protection Mobile Edition 6.0 provides protection for mobile devices against malicious threats and unauthorised access to sensitive corporate information by utilising award-winning antivirus technology, an advanced firewall, and SMS anti-spam protection. Symantec Endpoint Protection Mobile Edition helps ensure both the protection of the data on the mobile devices and compliance with internal and external security requirements.</p>
<p>• Symantec Network Access Control Mobile Edition 6.0 works with Symantec Endpoint Protection Mobile Edition to enforce compliancy with security policies to ensure that only secure, policy-compliant devices can access the network and email on Microsoft Exchange. Symantec Network Access Control Mobile Edition provides client-based integrity checking and centralised alerting of device integrity status. Assessment of host integrity status for mobile devices helps organisations ensure that they are able to consistently enforce IT policy. Centralised logging, reporting, and alerting further enables organisations to proactively monitor the status of managed devices.</p>
<p>• Symantec Mobile Management 7.0 increases IT efficiency with over-the-air deployment of applications and updates, improves end user productivity by managing mobile device health, and integrates with Symantec mobile security products to manage and secure mobile devices throughout their lifecycle. Symantec Mobile Management provides powerful remote assistance capabilities, real-time system management, granular software delivery and self repair, and complete visibility into the mobile environment.</p>
<p>Symantec’s mobile security and management solutions are built on the Symantec Management Platform, which provides unified enterprise-class management of desktops, laptops, servers and mobile devices. This enables administrators to centrally define and distribute security policies to mobile devices over-the-air. The Symantec Management Platform also provides product integration to enable unified security and management of mobile devices from a single management console, thus reducing complexity, mitigating risk, and lowering costs. Integration with Symantec LiveUpdate further helps to ensure timely updates of content.</p>
<p>A recent Enterprise Strategy Group survey commissioned by Symantec indicates that mobile devices are used by more employees, for more types of applications, to access more types of data - including confidential data - than ever before. Key findings from the survey of IT managers conducted in October 2009 include the following:</p>
<p>• 86 percent of respondents believe that mobile devices are either “critical” or “important” for business process and productivity.</p>
<p>• More than one-third responded that employees with mobile devices can access, receive, and store company confidential data, customer data, regulated data and intellectual property.</p>
<p>• 80 percent of organisations polled believe that it is “critical” or “important” to have an integrated management and security solution for mobile devices.</p>
<p>• 70 percent said that both mobile device and desktop/laptop PC security are managed by the same group within the organisation.</p>
<p>Licensing and Availability</p>
<p>Symantec Endpoint Protection Mobile Edition and Symantec Network Access Control Mobile Edition support Windows Mobile, Windows CE, and Symbian mobile devices while the Symantec Mobile Management solution offers support for Windows Mobile and Windows CE mobile devices. The solutions are now available and can be purchased directly from Symantec or through Symantec’s worldwide network of value-added authorised resellers, distributors and systems integrators. For more information, please visit, and</p>
<p>About Business Solutions from Symantec</p>
<p>Symantec helps organisations secure and manage their information-driven world with security management, endpoint security, messaging security, application security, server management, endpoint management and server virtualisation solutions.</p>
<p>About Symantec</p>
<p>Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organisations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at</p>
<p>NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at All prices noted are in U.S. dollars and are valid only in the United States.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.</p>
<p>(1) IDC, "Worldwide Converged Mobile Device 2009-2013 Forecast Update: September 2009," Doc # 220051, September 2009</p>
<p>Media Contact:</p>
<p>Jasmin Athwal</p>
<p>Max Australia</p>
<p>+61 2 9954 3492</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place