Symantec Sealed Program Guide

Size: px
Start display at page:

Download "Symantec Sealed Program Guide"

Transcription

1 SOLUTION BRIEF: SYMANTEC SEALED PROGRAM GUIDE Symantec Sealed Program Guide Who should read this paper The purpose of this document is to define the program, outline the process, and provide guidelines and resources for active and prospective Symantec Sealed Partners.

2

3 Content Preface Introduction Mobility Solutions from the Security Leader Symantec Sealed Program: Features How to Enroll Process Overview App Wrapping Testing Your Wrapped Application Symantec Validation and Assertion Re-Testing Requirements Program Benefits: Co-Marketing Web postings on Symantec Website Reference 1: Symantec Partner Reference/Partner Page Reference 2: Symantec Partner Reference Reference 3: Symantec Partner Page Symantec Sealed Catalog Program Logos Program Logos: Usage Guidelines Combined Trademarks Symantec Style Guide Press Releases and Media Events Lunch and Learn, Interactive Training Other Marketing Activities Resources/Contacts

4 Preface Introducing the Symantec Sealed Program Businesses today are challenged to increase mobile workforce productivity but are very concerned about the protection of their critical data and applications. According to Gartner, 70 percent of mobile professionals will conduct their work on personal smart devices by The Symantec Sealed Program and our industry-leading mobile solutions are key parts of our strategy to simplify mobile productivity without compromising protection, and enable personal and corporate apps on mobile devices. Symantec is simplifying this process by working with mobile app developers and independent software vendors (ISVs) to create a trusted ecosystem of mobile applications that businesses can rely upon for mobile productivity. This program is one more example of Symantec's industry-leading approach to mobility and enabling a productive and agile mobile workforce. The Symantec Sealed Program enables mobile app developers to easily embed Symantec's security and management features, such as encryption, authentication, data loss prevention policies, app distribution and revocation, into their apps. Organizations with Symantec App Center can now confidently manage apps, devices, and content across both ios and Android platforms with the same policy management engine. This Program Guide describes the process and resources available to partners and highlights the partnership that will further promote your application through the Symantec Sealed Program. Symantec Sealed Program partners are an integral part of the mobile experience that Symantec is delivering. We look forward to working with you. 1- Gartner BYOD Website, 1

5 Introduction The Symantec Sealed Program offers a trusted and comprehensive data and application security model, allowing developers to focus on application development while Symantec delivers enterprise-class wrapping. Symantec Sealed applications are integrated and tested to work with Symantec App Center, providing seamless and secure mobile productivity and management as part of the Symantec Mobile Management Suite. This program addresses the challenges that most developers face when managing and deploying commercial off-the-shelf applications. Developers are looking for integrated security solutions for their apps without being required to change the source code or use an SDK to wrap the application. Symantec is a leading vendor in providing proven security, value, and credibility; and offering a strong co-branding opportunity. Symantec's innovative approach to securing data, mobile applications and devices allows enterprise customers to be confident that their employees can be highly productive and safe in any environment. The Symantec Sealed Program promotes mobile enterprise applications that work with Symantec's Mobile Management Suite. This Program Guide explains the resources available, reviews the processes, and helps partners to optimize participation in this program. Mobility Solutions from the Security Leader Symantec's market-leading mobile data protection solutions enable comprehensive application security, through secured, encrypted interactions between applications and data. Communications to and from protected applications are secure while assuring data loss protection is enforced on a per-app basis. Additionally, Symantec's powerful tools support jailbreak, root, malware, and adware detection. Our application analysis helps enterprises monitor their systems and applications for quality, security, safety and privacy. With Mobile Management Suite, corporate administrators are able to define and manage the policies for all of their devices, applications and content through a centralized management point. The Symantec Sealed Program enables mobile application developers to easily embed Symantec's security and protection technology into their application. Enterprise customers can manage their secure ecosystem incorporating third-party licensed applications with the same enhanced security policies as their home-grown applications. Symantec Sealed Program: Features Symantec Sealed partners don't have to be security coding experts. Developers can rely on Symantec's security to accelerate their release cycles and deliver the wrapping of their application. The Symantec Sealed program provides the following: Accelerated application development without compromising security No security expertise required by application developer Visibility to Symantec's customers, partners, and channel via the Symantec Sealed Catalog Developer co-branding and marketing A competitive advantage by integrating with best-of-breed security from Symantec 2

6 Symantec Sealed partners can accelerate their release cycles by leveraging Symantec Sealed technology. Security is delivered via the wrapping of their application including: Simple wrapping and verification process (no source code changes required) Encryption of data with certified FIPS algorithms Copy/paste controls on data (including between applications) Document sharing controls between apps and other storage sites and services Remote over-the-air (OTA) management of policy including push, revoke, and remote wipe on an app-by-app basis Symantec Data Loss Prevention on mobile devices How to Enroll Mobile application vendors interested in joining the program can apply by contacting or visiting Click "join the program" and a Symantec program manager will contact the partner to discuss their interest in the program. Membership in the program will require approval of Symantec program management. The following steps outline the application process: Partner electronically registers for the Symantec Sealed Program and accepts the online Symantec Sealed Program Agreement Partner registers for a Symantec-hosted App Center Tenant Account (Symantec SaaS App Center environment) Symantec reviews Partner's registration information Once approved, Symantec provides confirmation of Partner's acceptance into the program and delivers credentials for a Symantec App Center Tenant Account Process Overview Symantec Sealed Partners can leverage the security policy management capabilities by wrapping their mobile application. This process is enabled once they join the Symantec Sealed Program, and have received credentials for the Symantec-hosted App Center Tenant Account. 1. Once registered in the Symantec Sealed Program, Symantec provides partner with access to the Symantec hosted App Center partner portal for app submission and testing 2. Partner compiles their app with the Symantec Sealed libraries 3. Symantec provides partner with test plan outline and partner completes testing 4. Symantec performs incremental testing and validates wrapped app, providing the Symantec Assertion code to the partner 5. Partner adds Symantec Release Assertion 3

7 6. Partner distributes Symantec Sealed app (wrapped app) to customers in accordance with third-party platform requirements (for example, Apple Store, Google Play, or other applicable method) 7. Enterprise administrators use App Center to define security policies and enable inter-app data sharing between Symantec Sealed apps 8. Users download app from the Apple Store (or other applicable app store), install on their device and join it to the secured App Center App Wrapping Once provided with a Symantec App Center Tenant account, Symantec Sealed Partners will be able to use the Symantec App Center to wrap their mobile applications. The partner then tests it within App Center to validate key elements including basic operations, authentication, encryption and data storage. Testing Your Wrapped Application Symantec will provide partners with a test plan outline. Partners are encouraged to add application-specific test cases to the test plan. Partners will execute the test plan, and if all tests are successful, submit test results to Symantec for validation. Symantec Validation and Assertion Symantec will review and verify partner test results. Symantec will then perform incremental testing, and if successful, the partner will be eligible to receive the Release Assertion to be included in the partner's application. Symantec will provide Release Assertion at its sole discretion. The Release Assertion enables the app to join a Symantec App Center ecosystem. Once the partner has added the Release Assertion to their app, Symantec will validate the app as Symantec Sealed, and partner may sign and distribute their app in accordance with relevant third-party platform requirements (for example, Apple Store, Google Play, etc.). Re-Testing Requirements In the event that the partner releases an incremental update of their application, it must be retested and Symantec must re-issue a Release Assertion for it to be functional in an App Center environment. Symantec may also require retesting of partner apps when Symantec releases a new version of the libraries, the App Center or other reasons at Symantec's discretion. Program Benefits: Co-Marketing The Symantec Sealed Program creates a partnership in delivering comprehensive security solutions to enterprise customers and addresses many of the challenges in seamlessly distributing secure applications. Joining the Symantec Sealed program enables partners to leverage the trusted Symantec brand, and addresses the growing demand for secure mobility. Validated partner apps will be featured in the Symantec Sealed Partner catalog. Symantec Sealed Partners become an integral part of an exclusive, growing partner ecosystem which will help accelerate their routes to market. Web postings on Symantec Website Symantec Sealed Program partners are part of an ecosystem that is listed on the Symantec program page. Symantec Sealed Partners are promoted on the Symantec Product and Program website: Symantec Sealed Program can be found at listed in products A-Z. Symantec Sealed Partners can include the following references on their website: 4

8 Reference erence 1: Symantec Partner Reference/Partner Page The following is the recommended content for a Symantec Sealed partner to use when creating a reference on a partner page to describe the Symantec Sealed Program relationship. Partners are required to submit any modifications to the language below to Symantec for review and approval. Suggested announcement: <Company Name> has joined the Symantec Sealed Program. This program highlights premier enterprise applications that are integrated and tested with the Symantec App Center product to secure enterprise applications and content. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Reference erence 2: Symantec Partner Referenceerence The following is the recommended content for a Symantec Sealed partner to use when creating a reference on a partner page to describe the Symantec Sealed Program relationship. Partners are required to let Symantec review and approve any modifications to the descriptions below. Suggested copy: <Company Name> has joined the Symantec Sealed Program. This program highlights premier enterprise applications that are integrated and tested with the Symantec App Center product to secure enterprise applications and content. Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. For specific country offices and contact numbers, please visit our website. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Reference erence 3: Symantec Partner Page The following is the recommended content for a Symantec Sealed partner to use when creating a unique webpage to describe the Symantec Sealed Program relationship, or for the specific Symantec Sealed App. Partners are required to submit any modifications to the language below to Symantec for review and approval. 5

9 Symantec Sealed Catalog Symantec will feature Symantec Sealed Apps in the Symantec Sealed Catalog. Partners will be asked to provide Symantec with logos (hi and low res), product names, descriptions and hyperlinks. Program Logos The Symantec Sealed Program is represented with the official logo for the program, which may only be used by registered Symantec Sealed Program partners. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. Symantec Sealed partners may reference their affiliation to the program with the logo below. Partners may include this logo on their website, on signage for events, and on other materials as approved by Symantec. Proper attribution and use are required as referenced under the Program Logos and Symantec Style Guide sections. 6

10 Once a partner app is wrapped and validated by Symantec, the Symantec Checkmark Logo and border will be electronically overlaid on the partner's logo as shown below. Proper attribution is required as referenced in the Trademarks section. Program Logos: Usage Guidelines The following attribution must be included whenever the Program Logos are displayed. It may be located on the splash screen for the app, or within the documentation provided with the app: Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and in other countries. Other names may be trademarks of their respective owners. Combined Trademarks The validated integrated product trademark will consist of the Symantec Checkmark Logo and border overlaid upon the Partner Product icon (the "combined trademark"), consistent with the following example: The following attribution footnote must be included with each use of a combined trademark in product documentation and marketing collateral: The Symantec Checkmark Logo is a registered trademark of Symantec Corporation or its affiliates in the U.S. and in other countries. The [validated pntegrated Product name] logo is a trademark of [Partner name] or its affiliates in the U.S. and in other countries. Symantec Style Guide The Symantec logos and trademarks referenced in this program guide must be used in accordance with the Symantec Partner Program Style Guide, which you can obtain by contacting SSP@symantec.com. Press Releases and Media Events The Symantec Sealed Program offers partners support for media events, press releases and other commercial communications. Symantec may invite partners to participate in specific venues at its discretion. 7

11 Lunch and Learn, Interactive Training Symantec's sales and marketing teams are anxious to offer value to the enterprise customer base. Symantec Sealed Partners may be asked to support webinars and interactive sessions with the Symantec field to enable them to more fully demonstrate the Symantec Sealed applications, create customer use-cases, and support customer engagements. Other Marketing Activities As joint marketing opportunities arise, the Symantec Sealed business team and resources are available to drive success with our partners. We are excited about our partnership opportunity and eager to work with you to maximize your involvement in the Program. Resources/Contacts Logo usage guideline document Legal terms and conditions in the Symantec Sealed Program Agreement To learn more about the program or apply for membership, visit the Symantec Sealed Program Program website at Contact 8

12

13 About Symantec Symantec protects the world s information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our worldrenowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at or by connecting with Symantec at go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 3/

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Securing Your Software for the Mobile Application Market

Securing Your Software for the Mobile Application Market WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for

More information

Securing Mobile App Data - Comparing Containers and App Wrappers

Securing Mobile App Data - Comparing Containers and App Wrappers WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Symantec Managed PKI Service Deployment Options

Symantec Managed PKI Service Deployment Options WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains

More information

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should

More information

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

How To Use Netbackup For Business

How To Use Netbackup For Business Enterprise Cloud Backup and Recovery with Symantec NetBackup Data Sheet: Backup and Disaster Recovery Overview of Symantec NetBackup As the established market leader, Symantec NetBackup delivers reliable

More information

Red Hat ISV Program Guide

Red Hat ISV Program Guide Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV

More information

9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT W M U G NL WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT 1 Agenda Who am I Apps and deployment Focus on Symantec s App Center Who am I? Arie de Haan Owner Pandinus -> System Center solutions

More information

Balancing Cloud-Based Email Benefits With Security. White Paper

Balancing Cloud-Based Email Benefits With Security. White Paper Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Symantec Workspace Virtualization 7.6

Symantec Workspace Virtualization 7.6 Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints

More information

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your

More information

Mobile Application Ecosystem

Mobile Application Ecosystem Mobile Application Ecosystem Scott Agnew May 13 th 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Environment

More information

Biomni Front Office for NetBackup

Biomni Front Office for NetBackup Multi-tenancy and self-service on the NetBackup Platform Data Sheet: Backup and Disaster Recovery This partnership with Biomni creates a solution that gives Symantec NetBackup customers multi-tenancy and

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Technology Partner Program

Technology Partner Program Technology Partner Program Partnering For Success Technology partnerships are critical to the ability of to deliver world-class solutions to customers. understands the challenges customers face in aligning

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

ADVANCING SECURITY, TOGETHER

ADVANCING SECURITY, TOGETHER SY M A N T E C S E C U RE ON E G U ID E LAST REVISED J U N E 2016 ADVANCING SECURITY, TOGETHER T H R I V E I N T H E F A S T - G R O W T H S E C U R I T Y M A R K E T S e c urit y Focused E a s ie r Ac

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

Symantec Mobility: Suite Service Description

Symantec Mobility: Suite Service Description Symantec Mobility: Suite Service Description Introduction Symantec Mobility: Suite ( Mobility Suite ) is a cloud-based Platform designed to help enterprise organizations securely provide access to enterprise

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Development Partner Program Overview

Development Partner Program Overview Development Partner Program Overview Benefits Sage Partner Solution Source Listing Gain exposure to thousands of potential customers and business partners. www.sagepss.com Access to Tools and Resources

More information

Symantec Business Critical Services for the Enterprise

Symantec Business Critical Services for the Enterprise Symantec Business Critical Services for the Enterprise Information is the currency of today s enterprise. Yet that information is increasingly at risk. Downtime is expensive, and IT departments can t afford

More information

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide

More information

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing

More information

MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS

MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS WHITE PAPER OVERVIEW: WHY DOES MOBILE SECURITY MATTER? Mobile devices present a unique dilemma to the enterprise. On the one hand, workers

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

How Extended Validation SSL Brings Confidence to Online Sales and Transactions WHITE PAPER: HOW EXTENDED VALIDATION SSL BRINGS CONFIDENCE TO ONLINE SALES AND TRANSACTIONS White Paper How Extended Validation SSL Brings Confidence to Online Sales and Transactions How Extended Validation

More information

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business TAKE CONTROL OF MOBILE SECURITY In the age of mobile work, safeguarding the network perimeter is not easy. Poorly protected smartphones are now

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

RED HAT ISV PARTNER PROGRAM GUIDE EMEA

RED HAT ISV PARTNER PROGRAM GUIDE EMEA RED HAT ISV PARTNER PROGRAM GUIDE EMEA the RED HAT ISV Partner program Welcome to the ISV Partner Program. As market demand for open source solutions increases, Red Hat looks forward to partnering with

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Website Security Partner Program. Website Security Partner Program Guide Maximize. Differentiate. Accelerate.

Website Security Partner Program. Website Security Partner Program Guide Maximize. Differentiate. Accelerate. Website Security Partner Program Website Security Partner Program Guide Maximize. Differentiate. Accelerate. Congratulations on becoming a Symantec TM Website Security Partner. The Symantec Website Security

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

Partner Technical Support Benefits Quick Guide

Partner Technical Support Benefits Quick Guide PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user

More information

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Workplace-as-a-Service BYOD Management

Workplace-as-a-Service BYOD Management For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service

More information

Comprehensive Enterprise Mobile Management for ios 8

Comprehensive Enterprise Mobile Management for ios 8 Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and

More information

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and

More information

Securing Mobile Apps in a BYOD World

Securing Mobile Apps in a BYOD World SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami

More information

Meeting Mobile and BYOD Security Challenges

Meeting Mobile and BYOD Security Challenges WHITE PAPER: MEETING MOBILE AND BYOD SECURITY CHALLENGES........................................ Meeting Mobile and BYOD Security Challenges Who should read this paper This white paper is written for enterprise

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Website Security Solutions Path to Specialization Experienced. Proven. Trusted.

Website Security Solutions Path to Specialization Experienced. Proven. Trusted. Website Security Partner Program Website Security Specialist Partner Website Security Solutions Path to Specialization Experienced. Proven. Trusted. Welcome to Symantec Website Security Partner program

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Optimizing the Data Center for Today s State & Local Government

Optimizing the Data Center for Today s State & Local Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS

More information

PrinterOn Mobile Applications for ios and Android

PrinterOn Mobile Applications for ios and Android PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.

More information

Symantec Verification Overview.BANK Verification

Symantec Verification Overview.BANK Verification Symantec Verification Overview.BANK Verification INTRODUCTION... 3.BANK VERIFICATION PROCESS... 4.BANK RE-VERIFICATION PROCESS... 5 Introduction ftld Registry Services, LLC founded by leaders in the financial

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

PROGRAM GUIDE. Polycom Technology Partner Overview

PROGRAM GUIDE. Polycom Technology Partner Overview PROGRAM GUIDE Technology Partner Overview Contents Program Overview.... 1 Why Partner With.... 1 The Partner Network.... 1 Program Goals... 1 Technology Partners.... 2 Technology Partner Participation

More information

Beginner s Guide to SSL Certificates

Beginner s Guide to SSL Certificates WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

Mobile Enterprise Management: Improving Healthcare While Protecting Patient Information

Mobile Enterprise Management: Improving Healthcare While Protecting Patient Information WHITE PAPER: MOBILE ENTERPRISE MANAGEMENT........................................ Mobile Enterprise Management: Improving Healthcare While Protecting Patient Information Who should read this paper Healthcare

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

The Pillars of a Next-Generation Enterprise Mobility Solution

The Pillars of a Next-Generation Enterprise Mobility Solution White Paper The Pillars of a Next-Generation Enterprise Mobility Solution Prepared by Ari Banerjee, Principal Analyst, Service Provider IT Sarah Wallace, Analyst Heavy Reading www.heavyreading.com on behalf

More information

Oracle Mobile Cloud Service. A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps

Oracle Mobile Cloud Service. A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps Oracle Mobile Cloud Service A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps Overview Emerging technologies have a way of quickly becoming conventional. Consider cloud computing.

More information

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information

More information