SlideShare a Scribd company logo
1 of 12
Symantec Mobile Strategy & Vision

    September 2010


Symantec Mobile Strategy Announcement   1
Global Mobile Market
            Global Mobile Market                                                                                 iPad /
                                                                                                                      / 
                                                                                                                iPhone
                                                                                                      2B iPhone    4
             1000                                                                         iPhone 3G 
                                                                                                        Apps 
                                                                                                     Downloaded
                                     Total Operator 
                                     Total Operator                                         / Apple 
                                                                                   iPhone A S
              900                                                                    2G
                                                                                          App Store
                                     Revenue
              800
                                     Operator Data                                    Google  Convinces FCC 
              700                                                                        to Open Access 
                                                                                             p
                                     Revenue                                          Network for 700MHz
              600                                                                                              Android 
$Billions




                                                                                                   First         2.1
                                                                                    Android      Android 
              500                                                                 Open Source     Phone
                                                                                   OS Started
                                                                                   OS Started
              400                             Blackberry                                 Blackberry  Blackberry 
                                                 Email                                    Bold and  App World
              300                                                                          Storm
                                  Japan 3G                US 3G        Japan >                  US 4G 
                                  Launched              Launched       50% 3G                 Launched
              200                                                                                                  HP 
                                                                                                                   HP
                       Windows                                                                                   Acquires 
                        Mobile                                                                                    Palm
              100      Launched
                                                       Symbian
                                                                                         Symbian Becomes 
                                                       Launched
                                                                                           Open Source
                 0
                       2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
                                         Revenue Data Source: Chetan
                                         Sharma Consulting, 2010
            Symantec Mobile Strategy Announcement                                                                            2
Mobile Ecosystem                                                  THREATS                   NEEDS
 Relevance to the Enterprise                                       DEVICE THEFT

                                                                    DATA LOSS
                                                                                        Pswd Control & Wipe
                                                                                        Encryption 
                                                                    MOBILE
                                                                     DEVICE             (Device/Email)
                                                                                        (D i /E il)
             MOBILE                                                APP THREATS
                                                                                        Device/App Control
             DEVICES                                               COMPLIANCE
                                                                                        Policy Delivery
                                               Corporate Devices                        Identity
                                 Personal Devices

                                                  3G-4G
                                                  Access


  THREATS               NEEDS
   MALWARE
                    Mobile Management
  DATA LOSS                                                                                                MOBILE
                    Email/Web Protection INTERNET
 ENTERPRISE                                                                                               CARRIER
  COMPLIANCE        Email Encrypt / DLP
DATA CENTER
                    Authentication
                    A th ti ti

                                                                           THREATS                     NEEDS
                                                                             MISUSE                Quality of 
                                                                                                   Experience
                                                                          CARRIER /
                                                                           CAPACITY
                                                                           SERVICE                 Hosted Mobile  
                                                                            OUTAGES
                                                                          PROVIDER                 Device/Service Mgt
                                                                                BRAND
                                                                                                   Fraud prevention
                                           DATA
                                          CENTER

 Symantec Mobile Strategy Announcement                                                                                3
Symantec s Broad Mobile Strategy & Solutions
Symantec’s Broad Mobile Strategy & Solutions
                                             ENTERPRISE /              CARRIER / 
       MOBILE DEVICE
                                             DATA CENTER            SERVICE PROVIDER




                                                 v
         Cross Platform




 Mobile MGMT / Security
 Mobile MGMT / Security                 Email Anti‐Malware/SPAM
                                        Email Anti‐Malware/SPAM       Mobile Security
                                                                      Mobile Security

    Mobile Encryption                    Data Loss Prevention     Email Anti‐Malware/SPAM

  Two‐Factor Auth (VIP)                    Email Encryption             Hosted PKI

    Device Certificates                 Endpoint Virtualization    Two‐Factor Auth (VIP)

                                           Key Management             Fraud Detection



Symantec Mobile Strategy Announcement                                                       4
How Symantec Can Help Now
How Symantec Can Help Now
A Complete Approach to Mobility Security and Management

              Enterprise
              E      i                    C
                                          Communication 
                                                   i i                  C
                                                                        Consumers
                                         Service Providers
       • Gain visibility and            • Improve your             • Secure your mobile 
         control of all mobile 
         control of all mobile            enterprise customers
                                          enterprise customers’      phone and keep your 
                                                                     phone and keep your
         platforms                        user experience            personal data safe

       • Embrace                        • Provide stronger         • Remotely lock or wipe 
         consumerization                                 y
                                          network security           y
                                                                     your mobile device in 
                                                    s                case of loss or theft 
       • Protect and extend             • Reduce your network        and keep your device 
         your existing security           operation costs by         clean through 
         investments                      eliminating malware,       Symantec’s anti‐
                                          viruses and mobile         malware functionality
                                                                        l      f ti      lit
                                          spam




Symantec Mobile Strategy Announcement                                                          5
Consumers
Norton Everywhere

•N t S
 Norton Smartphone Security
            t h    S    it
    – Symbian, Windows Mobile
    – Android – NEW!
      Android 
• Key Benefits
    – Prevent strangers from using your phone in 
      case of loss or theft
    – Protect your privacy and the personal 
      information on your phone
    – Detect and eliminate mobile threats before 
      they infect your device



Symantec Mobile Strategy Announcement               6
Communication Service Providers
Communication Service Providers
• Upcoming Solution for Carriers to Provide a Cloud‐Based Mobile 
  Security Solution for their Enterprise Customers
  Security Solution for their Enterprise Customers
• Key Benefits
    – Offer enterprises the ability to extend their IT policy to all mobile devices, 
                 p                y                    p y                         ,
      regardless of operating system or form factor
    – Protect your infrastructure from security threats
    – Reduce network infrastructure costs by eliminating mobile malware
      Reduce network infrastructure costs by eliminating mobile malware, 
      viruses and spam




Symantec Mobile Strategy Announcement                                               7
Key Enterprise Mobility Challenges
Key Enterprise Mobility Challenges

        Mobile                              SmartPhone                 App Mgmt &
                                                                       App Mgmt &
    Consumerization                        Heterogeneity           Enterprise Integration

   • Corporate data on
     Corporate data on                  • Multiple mobile
                                          Multiple mobile           • Mobile apps need to
                                                                      Mobile apps need to 
   personal devices                     platforms                   connect to the enterprise

   • Security, liability and            • Rapidly changing          • Enterprise have existing 
   manageability issues
   manageability issues                 capabilities                tools for PC management
                                                                    tools for PC management

   • Tidal wave of mobile               • Point solutions don’t     • Difficult to integrate to 
   requests                             solve this                  existing policies




Symantec Mobile Strategy Announcement                                                              8
How Symantec Solves Enterprise Mobility Challenges
How Symantec Solves Enterprise Mobility Challenges
     Comprehensive                       Unified & Scalable        Flexible Platform 
      Security for all                    Management of              for Enterprise 
      Mobile Devices                        all Platforms              Integration
 • Embrace                              • Manage all your end‐   • Standardize on a 
  consumerization ‐                      points from a single     platform that connects 
  Secure any mobile 
  Secure any mobile                      solution‐ servers
                                                   servers,       your mobile devices to 
                                                                  your mobile devices to
  device on the network                  desktops and mobile      enterprise apps, 
 • NEW! – iPhone, iPad,                  devices                  policies, processes and 
  Android Support                                                 personnel

 Cross Platform Security                Endpoint Management        Enterprise Grade

                                                                        Single Console
                                                                        Single Console
                                                                      Role‐based Access
                                                                       Groups/Org Units
                                                                      Alerts/Notifications




Symantec Mobile Strategy Announcement                                                        9
Enterprise Mobile Security & Management Overview
Mobile Devices                                                                                     Ent Apps & Services
                              Symantec Mobile Security & Management Products


                         Device             Content          Device            Identity & 
                        Security            Security       Management            Access


                                         Enterprise Security  Investments
                                         Enterprise Security Investments
                                   (processes, products, policies and personnel)



     Prevent 
     P     t                 Guard against 
                             G d       i t            Update devices 
                                                      U d t d i                 Authentication 
                                                                                A th ti ti            Leverage the 
                                                                                                      L        th
  unauthorized usage      viruses, spam,            with applications as     and authorization     existing security
  of devices and          malware  and              needed without           for access to         infrastructure
  features                protect data from         physical access          enterprise 
                          unauthorized usage                                 applications and         Allows scale and 
    Prevent the 
    Prevent the                                        Get visibility and 
                                                       Get visibility and    resources             efficiency from day
                                                                                                   efficiency from day
  device from               Prevent threat to       control of devices,                            one
  becoming a              the content on            users and                   Allow access to 
  vulnerability           devices                   applications             right resources 
                                                                             from right devices 
                                                                             with right postures
                                                                             with right postures


  Symantec Mobile Strategy Announcement                                                                                10
One Solution for All Features and Platforms
   Device Security
                       Passwords
                       Remote Wipe
                       App & Feature controls
                       Policy Delivery

   Content Security
                       AV, AM, AS                   ‐‐
                       Firewall                     ‐‐
                       Encryption/Mgmt

   Device Mgmt
                       App Management
                       Asset Inventory
                       Remote Assistance            ‐‐               ‐‐                         ‐‐
                       Configuration Mgmt

   Identity & Access
   Identity & Access
                       NAC
                       Soft tokens
                       PKI for Mobile


                          Current capability    Short‐term roadmap        ‐‐ – Not Applicable

Symantec Mobile Strategy Announcement                                                                11
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Mobile Security & Management                                                                                                                                                        12

More Related Content

What's hot

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasAEC Networks
 
iphone and samrt phone
iphone and samrt phoneiphone and samrt phone
iphone and samrt phonekhawla Osama
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyiStrategy
 
Jim seymour, alcatel lucent lte and lte-advanced
Jim seymour, alcatel lucent lte and lte-advancedJim seymour, alcatel lucent lte and lte-advanced
Jim seymour, alcatel lucent lte and lte-advancedmeenumecc
 
SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition Lars Kamp
 
SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11Jim Porter
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorThe Media Kitchen
 
Ishiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application DevelopmentIshiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application Developmentbhadrah
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokiaQuang Anh Le
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide DeckKevin McGee, MBA
 
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)Future of mobile media @ Future Ideas by h.kienhuis (sanoma)
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)Herman Kienhuis
 
future of mobile media (kienhuis) @ mobile convention amsterdam
future of mobile media (kienhuis) @ mobile convention amsterdamfuture of mobile media (kienhuis) @ mobile convention amsterdam
future of mobile media (kienhuis) @ mobile convention amsterdamHerman Kienhuis
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21shenwai
 
Mlibraries 3 workshop the role of mobile in research & teaching March 2011
Mlibraries 3 workshop the role of mobile in research & teaching March 2011Mlibraries 3 workshop the role of mobile in research & teaching March 2011
Mlibraries 3 workshop the role of mobile in research & teaching March 2011m-libraries
 
Reshaping Retail with Mobility
Reshaping Retail with MobilityReshaping Retail with Mobility
Reshaping Retail with MobilityCisco Services
 
Siemens: The Evolution of Corporate Communications
Siemens: The Evolution of Corporate CommunicationsSiemens: The Evolution of Corporate Communications
Siemens: The Evolution of Corporate CommunicationsEntel
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007Edoardo Schepis
 

What's hot (20)

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & Finanzas
 
iphone and samrt phone
iphone and samrt phoneiphone and samrt phone
iphone and samrt phone
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydney
 
Jim seymour, alcatel lucent lte and lte-advanced
Jim seymour, alcatel lucent lte and lte-advancedJim seymour, alcatel lucent lte and lte-advanced
Jim seymour, alcatel lucent lte and lte-advanced
 
SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition
 
SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11
 
Mobile asia expo 2012 exicon presenting nfc in china
Mobile asia expo 2012 exicon presenting nfc in chinaMobile asia expo 2012 exicon presenting nfc in china
Mobile asia expo 2012 exicon presenting nfc in china
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile Behavior
 
Ishiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application DevelopmentIshiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application Development
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokia
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide Deck
 
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)Future of mobile media @ Future Ideas by h.kienhuis (sanoma)
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)
 
future of mobile media (kienhuis) @ mobile convention amsterdam
future of mobile media (kienhuis) @ mobile convention amsterdamfuture of mobile media (kienhuis) @ mobile convention amsterdam
future of mobile media (kienhuis) @ mobile convention amsterdam
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21
 
What is a JAGTAG?
What is a JAGTAG?What is a JAGTAG?
What is a JAGTAG?
 
Mlibraries 3 workshop the role of mobile in research & teaching March 2011
Mlibraries 3 workshop the role of mobile in research & teaching March 2011Mlibraries 3 workshop the role of mobile in research & teaching March 2011
Mlibraries 3 workshop the role of mobile in research & teaching March 2011
 
Situational Web
Situational WebSituational Web
Situational Web
 
Reshaping Retail with Mobility
Reshaping Retail with MobilityReshaping Retail with Mobility
Reshaping Retail with Mobility
 
Siemens: The Evolution of Corporate Communications
Siemens: The Evolution of Corporate CommunicationsSiemens: The Evolution of Corporate Communications
Siemens: The Evolution of Corporate Communications
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007
 

Similar to Symantec Mobile Strategy and Vision 2010

Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsmobilesquared Ltd
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredmobilesquared Ltd
 
Argus snapshots for d3
Argus snapshots for d3Argus snapshots for d3
Argus snapshots for d3John Feland
 
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsIndiginox
 
Managing the Android Supply Chain and the Role of SPDX
Managing the Android Supply Chain and the Role of SPDXManaging the Android Supply Chain and the Role of SPDX
Managing the Android Supply Chain and the Role of SPDXBlack Duck by Synopsys
 
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsStefan Kolb
 
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Exicon
 
WinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire Technologies Inc
 
Alexander Oswald The Future of Maemo and Symbian
Alexander Oswald The Future of Maemo and SymbianAlexander Oswald The Future of Maemo and Symbian
Alexander Oswald The Future of Maemo and SymbianNokiaAppForum
 
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Robert Sutor
 
Mobile Apps - The Business & Technology
Mobile Apps - The Business & TechnologyMobile Apps - The Business & Technology
Mobile Apps - The Business & TechnologyAndri Yadi
 
TYPO3 CON 2019
TYPO3 CON 2019TYPO3 CON 2019
TYPO3 CON 2019Macopedia
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012Chuck Goldman
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Cisco Canada
 
iPhone Apps - What, how, why?
iPhone Apps - What, how, why?iPhone Apps - What, how, why?
iPhone Apps - What, how, why?David Carr
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013Andris Soroka
 

Similar to Symantec Mobile Strategy and Vision 2010 (20)

Mobile experiences
Mobile experiencesMobile experiences
Mobile experiences
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squared
 
Firefox OS
Firefox OSFirefox OS
Firefox OS
 
Argus snapshots for d3
Argus snapshots for d3Argus snapshots for d3
Argus snapshots for d3
 
Samsung's smartphone operating system: bada
Samsung's smartphone operating system: badaSamsung's smartphone operating system: bada
Samsung's smartphone operating system: bada
 
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
 
Managing the Android Supply Chain and the Role of SPDX
Managing the Android Supply Chain and the Role of SPDXManaging the Android Supply Chain and the Role of SPDX
Managing the Android Supply Chain and the Role of SPDX
 
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
 
Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012Enterprise Mobility Computerworld Mar 2012
Enterprise Mobility Computerworld Mar 2012
 
WinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store apps
 
Alexander Oswald The Future of Maemo and Symbian
Alexander Oswald The Future of Maemo and SymbianAlexander Oswald The Future of Maemo and Symbian
Alexander Oswald The Future of Maemo and Symbian
 
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
 
Mobile Apps - The Business & Technology
Mobile Apps - The Business & TechnologyMobile Apps - The Business & Technology
Mobile Apps - The Business & Technology
 
TYPO3 CON 2019
TYPO3 CON 2019TYPO3 CON 2019
TYPO3 CON 2019
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012
 
Dumb Pipes
Dumb PipesDumb Pipes
Dumb Pipes
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
 
iPhone Apps - What, how, why?
iPhone Apps - What, how, why?iPhone Apps - What, how, why?
iPhone Apps - What, how, why?
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Recently uploaded (20)

OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Symantec Mobile Strategy and Vision 2010

  • 1. Symantec Mobile Strategy & Vision September 2010 Symantec Mobile Strategy Announcement 1
  • 2. Global Mobile Market Global Mobile Market iPad / /  iPhone 2B iPhone 4 1000 iPhone 3G  Apps  Downloaded Total Operator  Total Operator / Apple  iPhone A S 900 2G App Store Revenue 800 Operator Data  Google  Convinces FCC  700 to Open Access  p Revenue Network for 700MHz 600 Android  $Billions First  2.1 Android  Android  500 Open Source  Phone OS Started OS Started 400 Blackberry  Blackberry  Blackberry  Email Bold and  App World 300 Storm Japan 3G  US 3G  Japan >  US 4G  Launched Launched 50% 3G Launched 200 HP  HP Windows  Acquires  Mobile  Palm 100 Launched Symbian Symbian Becomes  Launched Open Source 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Revenue Data Source: Chetan Sharma Consulting, 2010 Symantec Mobile Strategy Announcement 2
  • 3. Mobile Ecosystem THREATS NEEDS Relevance to the Enterprise DEVICE THEFT DATA LOSS Pswd Control & Wipe Encryption  MOBILE DEVICE (Device/Email) (D i /E il) MOBILE APP THREATS Device/App Control DEVICES COMPLIANCE Policy Delivery Corporate Devices Identity Personal Devices 3G-4G Access THREATS NEEDS MALWARE Mobile Management DATA LOSS MOBILE Email/Web Protection INTERNET ENTERPRISE CARRIER COMPLIANCE Email Encrypt / DLP DATA CENTER Authentication A th ti ti THREATS NEEDS MISUSE Quality of  Experience CARRIER / CAPACITY SERVICE Hosted Mobile   OUTAGES PROVIDER Device/Service Mgt BRAND Fraud prevention DATA CENTER Symantec Mobile Strategy Announcement 3
  • 4. Symantec s Broad Mobile Strategy & Solutions Symantec’s Broad Mobile Strategy & Solutions ENTERPRISE / CARRIER /  MOBILE DEVICE DATA CENTER SERVICE PROVIDER v Cross Platform Mobile MGMT / Security Mobile MGMT / Security Email Anti‐Malware/SPAM Email Anti‐Malware/SPAM Mobile Security Mobile Security Mobile Encryption Data Loss Prevention Email Anti‐Malware/SPAM Two‐Factor Auth (VIP) Email Encryption Hosted PKI Device Certificates Endpoint Virtualization Two‐Factor Auth (VIP) Key Management Fraud Detection Symantec Mobile Strategy Announcement 4
  • 5. How Symantec Can Help Now How Symantec Can Help Now A Complete Approach to Mobility Security and Management Enterprise E i C Communication  i i C Consumers Service Providers • Gain visibility and  • Improve your  • Secure your mobile  control of all mobile  control of all mobile enterprise customers enterprise customers’  phone and keep your  phone and keep your platforms user experience personal data safe • Embrace  • Provide stronger  • Remotely lock or wipe  consumerization y network security y your mobile device in  s case of loss or theft  • Protect and extend  • Reduce your network  and keep your device  your existing security  operation costs by  clean through  investments eliminating malware,  Symantec’s anti‐ viruses and mobile  malware functionality l f ti lit spam Symantec Mobile Strategy Announcement 5
  • 6. Consumers Norton Everywhere •N t S Norton Smartphone Security t h S it – Symbian, Windows Mobile – Android – NEW! Android  • Key Benefits – Prevent strangers from using your phone in  case of loss or theft – Protect your privacy and the personal  information on your phone – Detect and eliminate mobile threats before  they infect your device Symantec Mobile Strategy Announcement 6
  • 7. Communication Service Providers Communication Service Providers • Upcoming Solution for Carriers to Provide a Cloud‐Based Mobile  Security Solution for their Enterprise Customers Security Solution for their Enterprise Customers • Key Benefits – Offer enterprises the ability to extend their IT policy to all mobile devices,  p y p y , regardless of operating system or form factor – Protect your infrastructure from security threats – Reduce network infrastructure costs by eliminating mobile malware Reduce network infrastructure costs by eliminating mobile malware,  viruses and spam Symantec Mobile Strategy Announcement 7
  • 8. Key Enterprise Mobility Challenges Key Enterprise Mobility Challenges Mobile SmartPhone App Mgmt & App Mgmt & Consumerization Heterogeneity Enterprise Integration • Corporate data on Corporate data on  • Multiple mobile Multiple mobile  • Mobile apps need to Mobile apps need to  personal devices  platforms connect to the enterprise • Security, liability and  • Rapidly changing  • Enterprise have existing  manageability issues manageability issues capabilities tools for PC management tools for PC management • Tidal wave of mobile  • Point solutions don’t  • Difficult to integrate to  requests solve this existing policies Symantec Mobile Strategy Announcement 8
  • 9. How Symantec Solves Enterprise Mobility Challenges How Symantec Solves Enterprise Mobility Challenges Comprehensive  Unified & Scalable  Flexible Platform  Security for all  Management of  for Enterprise  Mobile Devices all Platforms Integration • Embrace  • Manage all your end‐ • Standardize on a  consumerization ‐ points from a single  platform that connects  Secure any mobile  Secure any mobile solution‐ servers servers,  your mobile devices to  your mobile devices to device on the network desktops and mobile  enterprise apps,  • NEW! – iPhone, iPad,  devices policies, processes and  Android Support personnel Cross Platform Security Endpoint Management Enterprise Grade Single Console Single Console Role‐based Access Groups/Org Units Alerts/Notifications Symantec Mobile Strategy Announcement 9
  • 10. Enterprise Mobile Security & Management Overview Mobile Devices Ent Apps & Services Symantec Mobile Security & Management Products Device  Content  Device  Identity &  Security Security Management Access Enterprise Security  Investments Enterprise Security Investments (processes, products, policies and personnel) Prevent  P t Guard against  G d i t Update devices  U d t d i Authentication  A th ti ti Leverage the  L th unauthorized usage  viruses, spam,  with applications as  and authorization  existing security of devices and   malware  and  needed without  for access to  infrastructure features protect data from  physical access enterprise  unauthorized usage applications and  Allows scale and  Prevent the  Prevent the Get visibility and  Get visibility and resources efficiency from day efficiency from day device from  Prevent threat to  control of devices,  one becoming a  the content on  users and  Allow access to  vulnerability devices applications right resources  from right devices  with right postures with right postures Symantec Mobile Strategy Announcement 10
  • 11. One Solution for All Features and Platforms Device Security Passwords Remote Wipe App & Feature controls Policy Delivery Content Security AV, AM, AS ‐‐ Firewall ‐‐ Encryption/Mgmt Device Mgmt App Management Asset Inventory Remote Assistance ‐‐ ‐‐ ‐‐ Configuration Mgmt Identity & Access Identity & Access NAC Soft tokens PKI for Mobile Current capability Short‐term roadmap ‐‐ – Not Applicable Symantec Mobile Strategy Announcement 11
  • 12. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Mobile Security & Management 12