Symantec Sealed Program Guide
|
|
- Amber Curtis
- 7 years ago
- Views:
Transcription
1 SOLUTION BRIEF: SYMANTEC SEALED PROGRAM GUIDE Symantec Sealed Program Guide Who should read this paper The purpose of this document is to define the program, outline the process, and provide guidelines and resources for active and prospective Symantec Sealed Partners.
2
3 Content Preface Introduction Mobility Solutions from the Security Leader Symantec Sealed Program: Features How to Enroll Process Overview App Wrapping Testing Your Wrapped Application Symantec Validation and Assertion Re-Testing Requirements Program Benefits: Co-Marketing Web postings on Symantec Website Reference 1: Symantec Partner Reference/Partner Page Reference 2: Symantec Partner Reference Reference 3: Symantec Partner Page Symantec Sealed Catalog Program Logos Program Logos: Usage Guidelines Combined Trademarks Symantec Style Guide Press Releases and Media Events Lunch and Learn, Interactive Training Other Marketing Activities Resources/Contacts
4 Preface Introducing the Symantec Sealed Program Businesses today are challenged to increase mobile workforce productivity but are very concerned about the protection of their critical data and applications. According to Gartner, 70 percent of mobile professionals will conduct their work on personal smart devices by The Symantec Sealed Program and our industry-leading mobile solutions are key parts of our strategy to simplify mobile productivity without compromising protection, and enable personal and corporate apps on mobile devices. Symantec is simplifying this process by working with mobile app developers and independent software vendors (ISVs) to create a trusted ecosystem of mobile applications that businesses can rely upon for mobile productivity. This program is one more example of Symantec's industry-leading approach to mobility and enabling a productive and agile mobile workforce. The Symantec Sealed Program enables mobile app developers to easily embed Symantec's security and management features, such as encryption, authentication, data loss prevention policies, app distribution and revocation, into their apps. Organizations with Symantec App Center can now confidently manage apps, devices, and content across both ios and Android platforms with the same policy management engine. This Program Guide describes the process and resources available to partners and highlights the partnership that will further promote your application through the Symantec Sealed Program. Symantec Sealed Program partners are an integral part of the mobile experience that Symantec is delivering. We look forward to working with you. 1- Gartner BYOD Website, 1
5 Introduction The Symantec Sealed Program offers a trusted and comprehensive data and application security model, allowing developers to focus on application development while Symantec delivers enterprise-class wrapping. Symantec Sealed applications are integrated and tested to work with Symantec App Center, providing seamless and secure mobile productivity and management as part of the Symantec Mobile Management Suite. This program addresses the challenges that most developers face when managing and deploying commercial off-the-shelf applications. Developers are looking for integrated security solutions for their apps without being required to change the source code or use an SDK to wrap the application. Symantec is a leading vendor in providing proven security, value, and credibility; and offering a strong co-branding opportunity. Symantec's innovative approach to securing data, mobile applications and devices allows enterprise customers to be confident that their employees can be highly productive and safe in any environment. The Symantec Sealed Program promotes mobile enterprise applications that work with Symantec's Mobile Management Suite. This Program Guide explains the resources available, reviews the processes, and helps partners to optimize participation in this program. Mobility Solutions from the Security Leader Symantec's market-leading mobile data protection solutions enable comprehensive application security, through secured, encrypted interactions between applications and data. Communications to and from protected applications are secure while assuring data loss protection is enforced on a per-app basis. Additionally, Symantec's powerful tools support jailbreak, root, malware, and adware detection. Our application analysis helps enterprises monitor their systems and applications for quality, security, safety and privacy. With Mobile Management Suite, corporate administrators are able to define and manage the policies for all of their devices, applications and content through a centralized management point. The Symantec Sealed Program enables mobile application developers to easily embed Symantec's security and protection technology into their application. Enterprise customers can manage their secure ecosystem incorporating third-party licensed applications with the same enhanced security policies as their home-grown applications. Symantec Sealed Program: Features Symantec Sealed partners don't have to be security coding experts. Developers can rely on Symantec's security to accelerate their release cycles and deliver the wrapping of their application. The Symantec Sealed program provides the following: Accelerated application development without compromising security No security expertise required by application developer Visibility to Symantec's customers, partners, and channel via the Symantec Sealed Catalog Developer co-branding and marketing A competitive advantage by integrating with best-of-breed security from Symantec 2
6 Symantec Sealed partners can accelerate their release cycles by leveraging Symantec Sealed technology. Security is delivered via the wrapping of their application including: Simple wrapping and verification process (no source code changes required) Encryption of data with certified FIPS algorithms Copy/paste controls on data (including between applications) Document sharing controls between apps and other storage sites and services Remote over-the-air (OTA) management of policy including push, revoke, and remote wipe on an app-by-app basis Symantec Data Loss Prevention on mobile devices How to Enroll Mobile application vendors interested in joining the program can apply by contacting or visiting Click "join the program" and a Symantec program manager will contact the partner to discuss their interest in the program. Membership in the program will require approval of Symantec program management. The following steps outline the application process: Partner electronically registers for the Symantec Sealed Program and accepts the online Symantec Sealed Program Agreement Partner registers for a Symantec-hosted App Center Tenant Account (Symantec SaaS App Center environment) Symantec reviews Partner's registration information Once approved, Symantec provides confirmation of Partner's acceptance into the program and delivers credentials for a Symantec App Center Tenant Account Process Overview Symantec Sealed Partners can leverage the security policy management capabilities by wrapping their mobile application. This process is enabled once they join the Symantec Sealed Program, and have received credentials for the Symantec-hosted App Center Tenant Account. 1. Once registered in the Symantec Sealed Program, Symantec provides partner with access to the Symantec hosted App Center partner portal for app submission and testing 2. Partner compiles their app with the Symantec Sealed libraries 3. Symantec provides partner with test plan outline and partner completes testing 4. Symantec performs incremental testing and validates wrapped app, providing the Symantec Assertion code to the partner 5. Partner adds Symantec Release Assertion 3
7 6. Partner distributes Symantec Sealed app (wrapped app) to customers in accordance with third-party platform requirements (for example, Apple Store, Google Play, or other applicable method) 7. Enterprise administrators use App Center to define security policies and enable inter-app data sharing between Symantec Sealed apps 8. Users download app from the Apple Store (or other applicable app store), install on their device and join it to the secured App Center App Wrapping Once provided with a Symantec App Center Tenant account, Symantec Sealed Partners will be able to use the Symantec App Center to wrap their mobile applications. The partner then tests it within App Center to validate key elements including basic operations, authentication, encryption and data storage. Testing Your Wrapped Application Symantec will provide partners with a test plan outline. Partners are encouraged to add application-specific test cases to the test plan. Partners will execute the test plan, and if all tests are successful, submit test results to Symantec for validation. Symantec Validation and Assertion Symantec will review and verify partner test results. Symantec will then perform incremental testing, and if successful, the partner will be eligible to receive the Release Assertion to be included in the partner's application. Symantec will provide Release Assertion at its sole discretion. The Release Assertion enables the app to join a Symantec App Center ecosystem. Once the partner has added the Release Assertion to their app, Symantec will validate the app as Symantec Sealed, and partner may sign and distribute their app in accordance with relevant third-party platform requirements (for example, Apple Store, Google Play, etc.). Re-Testing Requirements In the event that the partner releases an incremental update of their application, it must be retested and Symantec must re-issue a Release Assertion for it to be functional in an App Center environment. Symantec may also require retesting of partner apps when Symantec releases a new version of the libraries, the App Center or other reasons at Symantec's discretion. Program Benefits: Co-Marketing The Symantec Sealed Program creates a partnership in delivering comprehensive security solutions to enterprise customers and addresses many of the challenges in seamlessly distributing secure applications. Joining the Symantec Sealed program enables partners to leverage the trusted Symantec brand, and addresses the growing demand for secure mobility. Validated partner apps will be featured in the Symantec Sealed Partner catalog. Symantec Sealed Partners become an integral part of an exclusive, growing partner ecosystem which will help accelerate their routes to market. Web postings on Symantec Website Symantec Sealed Program partners are part of an ecosystem that is listed on the Symantec program page. Symantec Sealed Partners are promoted on the Symantec Product and Program website: Symantec Sealed Program can be found at listed in products A-Z. Symantec Sealed Partners can include the following references on their website: 4
8 Reference erence 1: Symantec Partner Reference/Partner Page The following is the recommended content for a Symantec Sealed partner to use when creating a reference on a partner page to describe the Symantec Sealed Program relationship. Partners are required to submit any modifications to the language below to Symantec for review and approval. Suggested announcement: <Company Name> has joined the Symantec Sealed Program. This program highlights premier enterprise applications that are integrated and tested with the Symantec App Center product to secure enterprise applications and content. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Reference erence 2: Symantec Partner Referenceerence The following is the recommended content for a Symantec Sealed partner to use when creating a reference on a partner page to describe the Symantec Sealed Program relationship. Partners are required to let Symantec review and approve any modifications to the descriptions below. Suggested copy: <Company Name> has joined the Symantec Sealed Program. This program highlights premier enterprise applications that are integrated and tested with the Symantec App Center product to secure enterprise applications and content. Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. For specific country offices and contact numbers, please visit our website. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Reference erence 3: Symantec Partner Page The following is the recommended content for a Symantec Sealed partner to use when creating a unique webpage to describe the Symantec Sealed Program relationship, or for the specific Symantec Sealed App. Partners are required to submit any modifications to the language below to Symantec for review and approval. 5
9 Symantec Sealed Catalog Symantec will feature Symantec Sealed Apps in the Symantec Sealed Catalog. Partners will be asked to provide Symantec with logos (hi and low res), product names, descriptions and hyperlinks. Program Logos The Symantec Sealed Program is represented with the official logo for the program, which may only be used by registered Symantec Sealed Program partners. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Symantec Sealed partners may reference their affiliation to the program with the logo below. Partners may include this logo on their website, on signage for events, and on other materials as approved by Symantec. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. 6
10 Once a partner app is wrapped and validated by Symantec, the Symantec Checkmark Logo and border will be electronically overlaid on the partner's logo as shown below. Proper attribution is required as referenced in the Trademarks section. Program Logos: Usage Guidelines The following attribution must be included whenever the Program Logos are displayed. It may be located on the splash screen for the app, or within the documentation provided with the app: Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and in other countries. Other names may be trademarks of their respective owners. Combined Trademarks The validated integrated product trademark will consist of the Symantec Checkmark Logo and border overlaid upon the Partner Product icon (the "combined trademark"), consistent with the following example: The following attribution footnote must be included with each use of a combined trademark in product documentation and marketing collateral: The Symantec Checkmark Logo is a registered trademark of Symantec Corporation or its affiliates in the U.S. and in other countries. The [validated pntegrated Product name] logo is a trademark of [Partner name] or its affiliates in the U.S. and in other countries. Symantec Style Guide The Symantec logos and trademarks referenced in this program guide must be used in accordance with the Symantec Partner Program Style Guide, which you can obtain by contacting SSP@symantec.com. Press Releases and Media Events The Symantec Sealed Program offers partners support for media events, press releases and other commercial communications. Symantec may invite partners to participate in specific venues at its discretion. 7
11 Lunch and Learn, Interactive Training Symantec's sales and marketing teams are anxious to offer value to the enterprise customer base. Symantec Sealed Partners may be asked to support webinars and interactive sessions with the Symantec field to enable them to more fully demonstrate the Symantec Sealed applications, create customer use-cases, and support customer engagements. Other Marketing Activities As joint marketing opportunities arise, the Symantec Sealed business team and resources are available to drive success with our partners. We are excited about our partnership opportunity and eager to work with you to maximize your involvement in the Program. Resources/Contacts Logo usage guideline document Legal terms and conditions in the Symantec Sealed Program Agreement To learn more about the program or apply for membership, visit the Symantec Sealed Program Program website at Contact 8
12
13 About Symantec Symantec protects the world s information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our worldrenowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at or by connecting with Symantec at go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 3/
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSecuring Your Software for the Mobile Application Market
WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for
More informationSecuring Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationSymantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
More information5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationDon t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It
WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should
More informationENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
More informationWhy Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
More informationMobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
More informationIs online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationBUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY
SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationSymantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
More informationPROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
More informationHow To Use Netbackup For Business
Enterprise Cloud Backup and Recovery with Symantec NetBackup Data Sheet: Backup and Disaster Recovery Overview of Symantec NetBackup As the established market leader, Symantec NetBackup delivers reliable
More informationRed Hat ISV Program Guide
Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV
More information9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT
W M U G NL WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT 1 Agenda Who am I Apps and deployment Focus on Symantec s App Center Who am I? Arie de Haan Owner Pandinus -> System Center solutions
More informationBalancing Cloud-Based Email Benefits With Security. White Paper
Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationSymantec Workspace Virtualization 7.6
Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints
More informationDon't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster
WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your
More informationMobile Application Ecosystem
Mobile Application Ecosystem Scott Agnew May 13 th 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Environment
More informationBiomni Front Office for NetBackup
Multi-tenancy and self-service on the NetBackup Platform Data Sheet: Backup and Disaster Recovery This partnership with Biomni creates a solution that gives Symantec NetBackup customers multi-tenancy and
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationTechnology Partner Program
Technology Partner Program Partnering For Success Technology partnerships are critical to the ability of to deliver world-class solutions to customers. understands the challenges customers face in aligning
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationADVANCING SECURITY, TOGETHER
SY M A N T E C S E C U RE ON E G U ID E LAST REVISED J U N E 2016 ADVANCING SECURITY, TOGETHER T H R I V E I N T H E F A S T - G R O W T H S E C U R I T Y M A R K E T S e c urit y Focused E a s ie r Ac
More informationEnterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER
Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationSymantec Mobility: Suite Service Description
Symantec Mobility: Suite Service Description Introduction Symantec Mobility: Suite ( Mobility Suite ) is a cloud-based Platform designed to help enterprise organizations securely provide access to enterprise
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationDevelopment Partner Program Overview
Development Partner Program Overview Benefits Sage Partner Solution Source Listing Gain exposure to thousands of potential customers and business partners. www.sagepss.com Access to Tools and Resources
More informationSymantec Business Critical Services for the Enterprise
Symantec Business Critical Services for the Enterprise Information is the currency of today s enterprise. Yet that information is increasingly at risk. Downtime is expensive, and IT departments can t afford
More informationADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards
SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide
More informationSecuring Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely
Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing
More informationMOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS
MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS WHITE PAPER OVERVIEW: WHY DOES MOBILE SECURITY MATTER? Mobile devices present a unique dilemma to the enterprise. On the one hand, workers
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationHow Extended Validation SSL Brings Confidence to Online Sales and Transactions
WHITE PAPER: HOW EXTENDED VALIDATION SSL BRINGS CONFIDENCE TO ONLINE SALES AND TRANSACTIONS White Paper How Extended Validation SSL Brings Confidence to Online Sales and Transactions How Extended Validation
More informationSECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business
SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business TAKE CONTROL OF MOBILE SECURITY In the age of mobile work, safeguarding the network perimeter is not easy. Poorly protected smartphones are now
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationRED HAT ISV PARTNER PROGRAM GUIDE EMEA
RED HAT ISV PARTNER PROGRAM GUIDE EMEA the RED HAT ISV Partner program Welcome to the ISV Partner Program. As market demand for open source solutions increases, Red Hat looks forward to partnering with
More informationSimplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationWebsite Security Partner Program. Website Security Partner Program Guide Maximize. Differentiate. Accelerate.
Website Security Partner Program Website Security Partner Program Guide Maximize. Differentiate. Accelerate. Congratulations on becoming a Symantec TM Website Security Partner. The Symantec Website Security
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationPartner Technical Support Benefits Quick Guide
PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationWorkplace-as-a-Service BYOD Management
For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service
More informationComprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
More informationTRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
More informationSecuring Mobile Apps in a BYOD World
SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami
More informationMeeting Mobile and BYOD Security Challenges
WHITE PAPER: MEETING MOBILE AND BYOD SECURITY CHALLENGES........................................ Meeting Mobile and BYOD Security Challenges Who should read this paper This white paper is written for enterprise
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationWebsite Security Solutions Path to Specialization Experienced. Proven. Trusted.
Website Security Partner Program Website Security Specialist Partner Website Security Solutions Path to Specialization Experienced. Proven. Trusted. Welcome to Symantec Website Security Partner program
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationSymantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
More informationSymantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support
WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS
More informationPrinterOn Mobile Applications for ios and Android
PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.
More informationSymantec Verification Overview.BANK Verification
Symantec Verification Overview.BANK Verification INTRODUCTION... 3.BANK VERIFICATION PROCESS... 4.BANK RE-VERIFICATION PROCESS... 5 Introduction ftld Registry Services, LLC founded by leaders in the financial
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationPROGRAM GUIDE. Polycom Technology Partner Overview
PROGRAM GUIDE Technology Partner Overview Contents Program Overview.... 1 Why Partner With.... 1 The Partner Network.... 1 Program Goals... 1 Technology Partners.... 2 Technology Partner Participation
More informationBeginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationMobile Enterprise Management: Improving Healthcare While Protecting Patient Information
WHITE PAPER: MOBILE ENTERPRISE MANAGEMENT........................................ Mobile Enterprise Management: Improving Healthcare While Protecting Patient Information Who should read this paper Healthcare
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationThe Pillars of a Next-Generation Enterprise Mobility Solution
White Paper The Pillars of a Next-Generation Enterprise Mobility Solution Prepared by Ari Banerjee, Principal Analyst, Service Provider IT Sarah Wallace, Analyst Heavy Reading www.heavyreading.com on behalf
More informationOracle Mobile Cloud Service. A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps
Oracle Mobile Cloud Service A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps Overview Emerging technologies have a way of quickly becoming conventional. Consider cloud computing.
More informationLeveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
More information