Securing Mobile App Data - Comparing Containers and App Wrappers
|
|
- Richard Perkins
- 8 years ago
- Views:
Transcription
1 WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS AND..... APP... WRAPPERS Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this paper This white paper is designed to introduce partners and end users to key technologies and technical concepts related to Enterprise Mobility Management. For organizations exploring solutions beyond device management for more granular control of data and applications on mobile devices, this white paper will help you to understand the differences in advanced containerization technologies.
2
3 Content Securing Mobile App Data Insights into App Containers Physical Containers Virtual Containers Per-App Containers SDK versus App Wrapping App Wrapping with Symantec Mobile Application Management Securing and Simplifying Seamless BYOD
4 Securing Mobile App Data Insights into App Containers The realities of BYOD create significant challenges when it comes to securing the corporate data residing on your users' mobile devices. Mobile users want to use the latest technology with easy access to their apps and data. Regardless of the OS, make and model of their mobile devices, they want an easy transition between their personal mobile lives and their corporate mobile lives. With corporate apps and personal apps co-existing on their devices, how do you make sure there's no unapproved mingling of corporate data between those apps? How do you keep that corporate app data secure? While Mobile Device Management (MDM) is a critical component of a mobile security strategy, it's not sufficient when it comes to securing app data. Analysts agree that to secure corporate app data on your users' mobile devices, you need to employ a Mobile Application Management (MAM) strategy. MAM is all about creating secure divisions between mobile users' personal apps and corporate apps. It encompasses the development, deployment, and management of mobile apps in a secure manner. A central aspect of a MAM strategy is creating distinct lines of separation on users' mobile devices between their personal apps and corporate apps. This has come to be known as containerization, the securing of corporate apps and their associated data within digital containers that govern app behavior and prevent unwanted interaction with personal apps. With the rising number of container offerings, it can be difficult to understand the differences between the various solutions and figure out which one might best address your needs. Depending on who you talk to, a container could be a workspace, hub, stack, JVM, wrapper, portal, sandbox, shell, partition, mode, app store, persona, or some other term to describe what a container is or should be. In order to make an informed decision on a container strategy, you need a bit of clarity regarding your container options. While some crossover exists between categories with subtle differences between solutions within each category, at a high level, containers typically fall into one of the three following categories: Physical containers Virtual containers Per-app containers Physical Containers Physical containers work at the chipset or kernel level of a mobile device to separate corporate apps and their data from a user s personal apps. In essence, it creates hardware level segmentation between a mobile user s corporate environment and personal environment. Usually this means establishing from the kernel and up a complete and separate OS stack just for corporate apps to reside and operate. This OS stack is completely distinct from the mobile device s normal OS stack where the users regular apps reside. A key security aspect of physical containers is that the OS stack typically has to leverage processor-specific capabilities. Even though some vendors that fall into this category actually refer to their solutions as virtual containers, it s this reliance on physical chipset features as well as hardware level encryption that places them in the physical container category. One of the biggest benefits offered by physical containers is the top to bottom secure isolation that they offer between the corporate OS stack and the device s normal OS stack, ensuring that no interaction can occur between corporate and personal apps. However, this stack-level isolation also creates one of the major drawbacks inherent to physical container solutions disruption of the user experience. Whenever users are logged into the mobile devices normal OS stack, they have to exit and enter into the corporate OS stack anytime they want to use a 1
5 corporate app. When they want to use a personal app, they have to reverse the process. The constant switching between physical containers not only creates a user inconvenience, but over an extended period of time it can cut significantly into user productivity. Another major benefit provided by physical container MAM solutions is that they are typically delivered on devices with certified hardware grade security. Additionally, the OS stack for the corporate-level apps has been hardened with security checks at every level of the stack. However, the hardware-specific nature of physical container offerings also creates major disadvantages for organizations considering this type of solution. The foremost of these is that physical container solutions are inherently not BYOD friendly. They are currently only available on Android devices, from only a few device manufacturers and only on a limited number of device models. Any organization that employs and administers a MAM strategy that incorporates a physical container solution, but still wants to support BYOD, will have to employ and administer an additional MAM strategy that accommodates ios, and Windows Mobile devices, as well as the majority of Android devices that have been designed and manufactured without physical container capabilities. The difficulty and added work that third-party and internal software developers have to undergo to develop apps that support a physical container model creates another challenge for organizations considering adopting this model. This difficulty results in a limited number of corporate apps that organizations can choose from to provision to their mobile users. Application Containerization Models Virtual Containers Virtual containers segment corporate apps within an encrypted workspace inside the operating system. It can be compared to a single sandbox or Java Virtual Machine (JVM) with multiple apps running inside it. Since there is no physical separation between the apps on the inside and those on the outside, the same operating system and kernel control the operations and interactions of all the apps on the mobile device regardless of whether those apps reside inside or outside of the virtual container. Even though all apps on the device share the same operating system kernel, the virtual container employs policies to govern what types of interactions may occur among apps inside the virtual container. This is one of the main security benefits provided by virtual containers, that all interactions between corporate apps in the container stay within the container. Likewise, all of the data associated with the virtual container s apps remains secure within the confines of the virtual sandbox. 2
6 However, a downside of virtual container offerings is that they make the assumption that all apps deployed within the container will be wellbehaved. The policies that govern virtual container interactions typically lack fine-grained controls that would allow administrators to govern behavior on a per-app basis. Rather, policies are typically applied equally to all apps within the container. As a result, the container as a whole can become compromised if a malicious app is unknowingly deployed within the container. Policies also govern if and how interactions may occur between apps on the inside and outside of the container. Any communications that extend beyond the borders of the virtual container, such as network communication, must rely on the secure nature of the kernel. In terms of the user experience, similar to physical containers, virtual containers create a separate location for accessing corporate apps. Some view this as a benefit, since they can go to one place to find all of their corporate apps. However, many view this as a disruption to the user experience, since users have to continually enter and exit the virtual container to switch between their personal and corporate apps. Compared to physical container offerings, virtual container solutions are generally more BYOD friendly. The degree of actual BYOD support will vary between vendors. Virtual container solutions require third-party and internal software developers to develop or modify their apps to support a vendor-specific container environment. As a result virtual container solutions often offer organizations a very limited selection of apps that can be made available to their mobile users. Additionally, virtual container strategies can require significant administration effort to support and manage. Per-App Containers As the name implies, per-app container offerings create a self-contained sandbox to secure each individual app and its data. This application level segmentation provides security benefits similar to that of both virtual and physical containers, but through its more granular approach it offers administrators greater flexibility in how apps are secured, while presenting users a more seamless user experience. Under the per-app container model, policies still govern interaction between contained apps and non-contained apps, but it doesn t force a one-size-fits-all policy implementation. Administrators can choose to configure general policies that apply to all apps, specific policies for individual apps, or a combination of both. For example, a general policy might exist that prevents any copying and pasting between any apps, while allowing certain contained apps to share documents with each other and then preventing other contained apps from sharing. They can also granularly control the directional flow of data for each app, such as inbound and outbound communications. Per-app container solutions often provide granular control over interaction with non-contained apps. Organizations can choose to not allow any interaction between contained apps and non-contained apps or decide that certain contained apps can have limited interaction with noncontained apps. Additionally, since each contained app s data is individually encrypted and secured by policy, it ll remain protected if a malicious app happens to infect the mobile device. While per-app contained apps do rely on the operating system kernel to handle these interactions, the individual containers don t trust the kernel with their encryption keys. The combination of the per-app policy governance and application-level encryption gives organizations the added level of security they need to keep their corporate apps and data safe. As another major benefit, of all the different container models, the per-app container model offers the most seamless and user friendly experience. Since users enjoy the same native app experience they re accustom to, they generally require no training or learning curve. While vendor implementation differs, users typically don t have to constantly enter and exit contained and non-contained environments to switch between personal apps and corporate apps. 3
7 Users can easily see and access all the apps they are authorized to use whether they are personal or corporate apps. Depending on the specific product offering, corporate and personal apps might be located in separate views or mingled within the same view. Some per-app container solutions even provide single sign-on, which makes the secure transition from a non-contained app to a contained app even easier. In spite of the easy access and transition to the contained apps, the individually encrypted container encompassing each of the different apps ensures their protection. Two main methods exist for implementing per-app containerization: the SDK method or app wrapping. The vendor s chosen implementation method will determine in large part the amount of effort required by app developers and IT administrators to support a mobile strategy that takes advantage of the per-app container model. SDK versus App Wrapping A vendor that employs a SDK method to containerize individual apps requires app developers to modify or recompile their existing code according to specifications in a vendor-specific SDK in order to support the vendor s unique offering. For third-party software developers this often means creating and maintaining multiple versions of the same app to support multiple vendor solutions. When OS updates occur, developers might also have to update each of those different versions of their app to remain operative. Due to the requirements and efforts involved in supporting a per-app container implementation via a SDK, some software vendors will choose to only support a few such offerings or none at all, limiting the app choices available to an organization. Similarly, for any internally developed apps, the organization will have to expend development resources to alter their app code to comply with the vendor s specifications. Conversely, app wrapping methodologies do not require any changes to the app s code. Third- party or internal developers simply upload the app to an online tool provided by the vendor, and in minutes they have a secure app wrapped in its own individual container. One benefit of the SDK method is that it does give software developers the added option to choose to use custom components or methods prescribed in the SDK for securing the app. This flexibility can help developers both in their development and testing efforts. Still, the proper employment of the methods and calls specified in the SDK assumes a certain level of expertise from the developer. Improper or incomplete application of security measures provided by the SDK can leave an app vulnerable. Whereas with an app wrapping offering, there s a greater guarantee that encryption and security measures will be applied to all apps as expected. App Wrapping with Symantec Mobile Application Management Symantec Mobile Application Management utilizes app wrapping to provide a secure separation of corporate and personal data on users mobile devices. In addition to being able to wrap a layer of security and per-app policy management around corporate apps without requiring source code changes, Application Management offers a number of benefits in addition to those provided by both SDK and other app wrapping solutions. Application Management provides tamper proofing for the policies on every wrapped app to prevent unauthorized modifications to app policies and make sure only entitled users can access a device s corporate apps. Every time an app is updated or a new version installed, Application Management verifies the legitimacy of the policy. If it detects that a policy has been wrongfully altered, the app won t launch. Additionally, all third-party apps that go through the Symantec Sealed Program s certification process are tamper-proofed as well. Each sealed app is fingerprinted with a hash code. So, each time an app is launched, the app s fingerprint hash code is verified. If it doesn t match, the solution knows the app has been tampered with and won t load it. 4
8 The granular per-app policy controls and protection provided by Symantec include user authentication, document sharing, copy/paste controls, offline access, control over local data storage and encryption, AirDrop and AirPrint blocking, secure app connectivity and SSL connection certificate management, centralized policy management and more. Symantec Mobility: Application Management provides dynamic policy updates. So, if an administrator modifies the policy for a certain corporate app, not only does the app not have to be rewrapped, but it doesn t require the user to re-download the app. Whenever the app launches, it automatically checks in with the organization s App Center server for updates and automatically applies any policy changes. In addition to tamper proofing and per-app policy protection, Symantec gives organizations the ability to have a series of compliance checks execute every time an app attempts to launch. For example, it can check to see if the mobile device is MDM compliant or verify that the device hasn t been jail-broken or rooted. If any of the specified compliance checks fail, the corporate app won t launch. Symantec also gives organizations the added ability to encrypt the bundle information of their internally developed corporate apps. This includes encryption of in-transit and at-rest data, as well as resource, graphics and other collateral data required by the app. Securing and Simplifying Seamless BYOD Encrypted segmentation or containerization of users corporate apps from personal apps has proven to be the preferred strategy among analysts and organizations for securing corporate apps and associated data on corporate users mobile devices. Still, organizations have a variety of app container models and solutions to choose from when it comes down to actual implementation. Taking advantage of a per-app container model that employs app wrapping enables organizations to secure, simplify and facilitate a userfriendly BYOD strategy, while providing a seamless user experience, reduced development and administration effort, and comprehensive, fine-grain policy controls for each individual corporate app. 5
9
10 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 7/
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More information5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
More informationHost-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
More informationCyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
More informationSecuring Your Software for the Mobile Application Market
WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationConfidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationSymantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
More informationSymantec Workspace Virtualization 7.6
Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints
More informationSYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
More informationPartner Technical Support Benefits Quick Guide
PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationTop 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
More informationAchieving Business Agility Through An Agile Data Center
Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
More informationRealizing the True Potential of Software-Defined Storage
Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure
More informationSYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationMobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationBest Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
More informationBackup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationDelivering Performance and Value through Multiple Deduplication Pools
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationSymantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationKeeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA
Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Solution Overview: High Availability Introduction Providing high availability to clinical applications like GE Universal
More informationMicrosoft Office 365 Migrations with Symantec Enterprise Vault.cloud
WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationPROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
More informationMobile Enterprise Management: Improving Healthcare While Protecting Patient Information
WHITE PAPER: MOBILE ENTERPRISE MANAGEMENT........................................ Mobile Enterprise Management: Improving Healthcare While Protecting Patient Information Who should read this paper Healthcare
More informationThe Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
More informationIncreasing Revenue Through Information Protection Services
SOLUTION BRIEF: COMMUNICATION SERVICE PROVIDERS........................................ Increasing Revenue Through Information Protection Services Who should read this paper Service Provider Executives
More informationEmbracing Android in the Enterprise
WHITE PAPER: EMBRACING ANDROID IN THE ENTERPRISE........................................ Embracing Android in the Enterprise Who should read this paper This white paper is intended for CIOs, CISOs, VPs
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationFinding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
More informationBUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY
SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationAsset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
More informationEnterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationInstant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationBest Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationIs online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationDATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationSymantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
More informationProtecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
More informationMobile Application Management with XenMobile and the Worx App SDK
Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started
More informationEnterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER
Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly
More informationDelivering a New Level of Data Protection Resiliency with Appliances
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationComprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY
PORTTFOLIO BROCHURE MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationIn-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More information9-4-2014 W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT
W M U G NL WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT 1 Agenda Who am I Apps and deployment Focus on Symantec s App Center Who am I? Arie de Haan Owner Pandinus -> System Center solutions
More informationSymantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
More informationDatacane - When the bits hit the fan!
TECHNICAL BRIEF: DATACANE........................................ Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationJUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationBeginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationAndroid for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
More informationBalancing Security and Speed: Developing Mobile Apps for Enterprise
Balancing Security and Speed: Developing Mobile Apps for Enterprise Contents Executive Summary 3 The Realities of Developing Secure Enterprise Applications 3 How Data Leaves Mobile Devices 3 Partnering
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationMOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS
MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS WHITE PAPER OVERVIEW: WHY DOES MOBILE SECURITY MATTER? Mobile devices present a unique dilemma to the enterprise. On the one hand, workers
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationSecuring Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely
Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing
More informationSecuring Microsoft Exchange 2010 With VeriSign Authentication Services
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for
More information