Symantec has unveiled its mobile security and management strategy, including three products to help organisations secure and manage data of mobile devices in the enterprise.
Symantec said its mobile strategy focuses on integration of its mobile security and management services to help customers reduce downtime, increase user productivity, improve response time and provide protection and management throughout the mobile device lifecycle – from provisioning and management to security and eventual device retirement.
The Endpoint Protection Mobile Edition 6.0 provides protection for mobile devices against malicious threats and unauthorised access to corporate information by utilising antivirus technology, a firewall, and SMS anti-spam protection, the company said.
According to Symantec, the Network Access Control Mobile Edition 6.0 works with Endpoint Protection Mobile Edition to ensure that only policy-compliant devices can access the network and email on Microsoft Exchange. It provides client-based integrity checking and centralised alerting of device integrity status. Centralised logging, reporting, and alerting enables organisations to monitor the status of managed devices.
The company said that the Mobile Management 7.0 deploys applications and updates, enhances end user productivity by managing mobile device health and integrates with mobile security products to manage and secure mobile devices. It provides remote assistance capabilities, system management, granular software delivery and self repair, and visibility into the mobile environment.
The company’s mobile security and management services are built on the management platform, which provides unified management of desktops, laptops, servers and mobile devices. The Symantec Management Platform provides product integration to enable unified security and management of mobile devices from a single management console.
Art Gilliland, vice president of enterprise security group at Symantec, said: Our mobile strategy is designed to protect and manage data wherever it resides and automate procurement and provisioning, provide ongoing maintenance and protection, and quickly retire the mobile devices if they are lost, damaged, stolen or replaced.