SlideShare a Scribd company logo
ZABEZPEČENIE MOBILNÝCH ZARIADENÍ VO
FIREMNOM PROSTREDÍ
Ján Kvasnička
Senior Pre-Sales Consultant, Czech Republic and Slovakia
THE CHALLENGES OF MOBILITY MOVE BEYOND THE DEVICE
Copyright © 2015 Symantec Corporation
2
Information must be
protected no matter
where it resides
Protecting sensitive
information takes
priority over
protecting devices
INFORMATION IS
EVERYWHERE
The number of
mobile threats is on
the rise
Exposure to malware
and risky apps
RISE OF MOBILE
THREATS
Users adopt personal
apps to improve
productivity
Data leaks to
unauthorized, cloud-
based apps
MOBILE APPS
Multiple platforms
with disparate
controls
Users want the latest
technology and apps
ADVENT OF MOBILE
AND BYOD
THE NUMBER OF MOBILE THREATS IS ON THE RISE
Copyright © 2015 Symantec Corporation
3
Classified as
Malware
Classified as
Grayware
Further
classified as
Madware
1.4 M
0.7 M
0.2 M
2.3 M
2.2 M
1.4 M
1.3 M
1.2 M
0.6 M
OF THE 6.3 MILLION APPS ANALYZED IN 2014, 1 MILLION WERE CLASSIFIED AS
MALWARE AND 2.3 MILLION WERE CLASSIFIED AS GRAYWARE
Source: Symantec ISTR 2015
CAUSES OF MOBILE THREATS BY CLASSIFICATION
Copyright © 2015 Symantec Corporation
4
Send Content
Adware Annoyance
Reconfigure Device
Traditional Threats
Steal Information
Track User
26% TRADITIONAL THREATS – Backdoor Trojans, Downloaders, DDoS Utility, etc.
22% TRACK USER – Threats that spy on users, tracks user locations
21% STEAL INFORMATION - Steal device data, media files, and any user credentials
Source: Symantec ISTR 2015
SYMANTEC IS ADJUSTING TO MEET CUSTOMER NEEDS
Copyright © 2015 Symantec Corporation
5
Stop malicious mobile threats
Protect your sensitive information, wherever it resides
SYMANTEC MOBILITY SUITE
Copyright © 2015 Symantec Corporation
6
MOBILITY: SUITE
MOBILITY: DEVICE
MANAGEMENT
MOBILITY:
APPLICATION
MANAGEMENT
MOBILITY:
WORKFORCE APPS
MOBILITY: THREAT
PROTECTION
MOBILE DEVICE MANAGEMENT
Copyright © 2015 Symantec Corporation
7
Activate enterprise access
easily and automatically
ENABLE SECURE
Enforce device policies and
compliance
MANAGE
Visibility and reporting with
web-based management
Enable, secure, and manage your heterogeneous mobile environment
MOBILE APPLICATION MANAGEMENT
Copyright © 2015 Symantec Corporation
8
Symantec’s Enterprise App
Store is end-user and IT friendly
MOBILIZE APPS & CONTENT PROTECT INFORMATION
Extend enterprise security
policies
Integration with DLP
SOLVE FOR BYOD
Clear separation of corporate
and personal data
MOBILE
APP
MOBILIZE APPS AND CONTENT
Copyright © 2015 Symantec Corporation
9
ENTERPRISE APP STORE
• Distribute/update/revoke specific apps/content
• Web, native, HTML5 – in-house, external apps
• PDF’s, videos, ePub documents, forms
END-USER AND IT FRIENDLY
• Consumer-style portal, reviews, screenshots
• Corporate branding
• Versioning and expiration options
PROTECT INFORMATION ON MOBILE APPS
Copyright © 2015 Symantec Corporation
10
ENTERPRISE SECURITY POLICIES
• Authentication: LDAP/SAML – online, offline access
• Encryption: FIPS 140-2, AES 256 – for all selected data
• Data Loss Prevention: copy-paste, sharing restrictions
SAFELY EXTEND ENTERPRISE RESOURCES
• App Proxy secures app data in transit
• Email Proxy prevents unauthorized access to Exchange
• No firewall holes or device-wide VPN
SYMANTEC APP WRAPPING TECHNOLOGY
• No developer resources required
• No additional infrastructure required
• No delays on mobile app rollouts
App wrapped with Symantec libraries and policy controls
SOLVE FOR BYOD
Copyright © 2015 Symantec Corporation
11
ALLOW PERSONAL DEVICES
• Secure access to corporate information
• Auto-configuration of settings like Wi-Fi and VPN
• Lock and wipe only specific corporate data
END-USER AND IT FRIENDLY
• No device level controls
• No monitoring of device apps or data
• Focus on corporate apps and data
A clear separation of corporate and personal data
WORKFORCE APPS
Copyright © 2015 Symantec Corporation
12
MOBILITY: WORKFORCE APPS
WORK MAIL
A secure email/PIM app
WORK WEB
A secure browser for websites and apps
WORK MAIL
Copyright © 2015 Symantec Corporation
13
• Automatically configure and sync Email, Calendar,
Contacts, Tasks, and Notes
• Rich integration with Exchange ActiveSync (EAS)
• Push Notifications
• Simplified Enrollment
• AES-256 Encryption for all data and SD card
• Password policy management
• Attachment policies and secure storage
• Support S/MIME signing and encryption
A secure app for email/PIM
WORK WEB
Copyright © 2015 Symantec Corporation
14
• Enable secure access to web-based corporate
resources
• Whitelist URLs that may be opened in the web
browser
• Require internal websites and web-based apps to open
in Work Web
• Pre-configure web bookmarks for employees
• Restrict copy/paste of data and open-in attachments
to unapproved apps
• Leverage secure app proxy as a virtual network
gateway for incoming traffic
• Perform safe web searches powered by Norton Safe
Search
A secure browser for accessing websites and apps
THREAT PROTECTION
Copyright © 2015 Symantec Corporation
15
Advanced, proactive protection
against risky apps
APP ADVISOR ANTI-MALWARE
Protect against latest threats
with Live-Update
Compliance rules based on
device security posture
WEB PROTECTION
Detect and block phishing
websites
APP RISK REPORTING POWERED BY NORTON MOBILE INSIGHT
Copyright © 2015 Symantec Corporation
16
200+ APP STORES
Crawled continuously
30K NEW APPS
Processed every 24 hours
15M ANDROID
Android apps in our
database
800K APPS
With medium or high
battery or data usage
3M MALICIOUS
Apps identified
90M APPS
With potential privacy
leaks or intrusive behaviors
APP ADVISOR IDENTIFIES RISKY APPS
• Apps that leak information
• Apps that drain battery
• Apps that consume too much bandwidth
• Proactive protection before download from Google Play
• Enable users to make informed decisions about apps
Copyright © 2015 Symantec Corporation
18
Copyright © 2015 Symantec Corporation
19
Copyright © 2015 Symantec Corporation
20
PROTECT AGAINST MALICIOUS THREATS
ANTI-MALWARE
• Fast and effective on-device scans
• Protect against latest threats with Live-Update
integration
• Implement compliance rules based on device
security posture
WEB PROTECTION
• Detect and block phishing websites
• Enable safe mobile browsing
SYMANTEC’S MOBILE VISION AND STRATEGY
Copyright © 2015 Symantec Corporation
22
THREAT
PROTECTION
INFORMATION
PROTECTION
INTEGRATE SYMANTEC’S MOBILE TECHNOLOGY INTO BROADER SOLUTIONS TO HELP
YOU PROTECT YOUR SENSITIVE INFORMATION AND PROTECT AGAINST THREATS
THANK YOU!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Ján Kvasnička
jan_kvasnicka@symantec.com

More Related Content

PDF
Symantec: čas přítomný a budoucí
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
PPTX
Kaspersky
PDF
Complete Endpoint protection
PPTX
Technology Overview - Symantec Endpoint Protection (SEP)
PPTX
The Importance of Endpoint Protection - Featuring SEP 14
PPTX
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
PDF
Data Center Server security
Symantec: čas přítomný a budoucí
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
Complete Endpoint protection
Technology Overview - Symantec Endpoint Protection (SEP)
The Importance of Endpoint Protection - Featuring SEP 14
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Data Center Server security

What's hot (20)

PDF
The Four Horsemen of Mobile Security
PPTX
Supply Chain Threats to the US Energy Sector
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
The Motives, Means and Methods of Cyber-Adversaries
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PPTX
F secure Radar vulnerability scanning and management
PDF
Panda Security - Endpoint Protection
PPTX
How to Predict, Detect and Protect Against Mobile Cyber Attacks
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Protect Your Data and Apps in the Public Cloud
PDF
Next Generation Security
PDF
Kaspersky Endpoint Security for Business 2015
PPTX
Sophos Cloud - breaking the stereotypes
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PPTX
5 Steps to Reduce Your Window of Vulnerability
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Kaspersky endpoint security business presentation
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Consider Sophos - Security Made Simple
The Four Horsemen of Mobile Security
Supply Chain Threats to the US Energy Sector
How to Add Advanced Threat Defense to Your EMM
The Motives, Means and Methods of Cyber-Adversaries
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
F secure Radar vulnerability scanning and management
Panda Security - Endpoint Protection
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Protect Your Data and Apps in the Public Cloud
Next Generation Security
Kaspersky Endpoint Security for Business 2015
Sophos Cloud - breaking the stereotypes
Accessibility Clickjacking, Devastating Android Vulnerability
Talos Insight: Threat Innovation Emerging from the Noise
5 Steps to Reduce Your Window of Vulnerability
Security: more important than ever - Sophos Day Belux 2014
Kaspersky endpoint security business presentation
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Consider Sophos - Security Made Simple
Ad

Similar to Zabezpečení mobilních zařízení ve firemním prostředí (20)

PPTX
Symantec Mobile Security
PPTX
Top Risks of Enterprise Mobility
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
Evaluate Top Seven Risks of Enterprise Mobility
PPTX
Symantec AppCenter Webinar.pptx
PPTX
Why you need to secure mobile apps - now
PDF
Symantec Mobile Security Webinar
PPTX
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
PPTX
Symantec Enterprise Mobility Enhancements
PDF
Infographic: Mobile is growing and so are security threats
PDF
Symantec Enterprise Mobility Vision May 2012
PDF
Symantec Endpoint Suite
PPTX
Symantec Advances Enterprise Mobility Strategy
PDF
8 Principales Raisons de Passer du MDM à l'EMM
PDF
Mobile malware and enterprise security v 1.2_0
PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PDF
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
PDF
Simple and secure mobile cloud access
PDF
Securing mobile apps in a BYOD world
PDF
Whitepaper - CISO Guide_6pp
Symantec Mobile Security
Top Risks of Enterprise Mobility
Top Seven Risks of Enterprise Mobility - How to protect your business
Evaluate Top Seven Risks of Enterprise Mobility
Symantec AppCenter Webinar.pptx
Why you need to secure mobile apps - now
Symantec Mobile Security Webinar
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
Symantec Enterprise Mobility Enhancements
Infographic: Mobile is growing and so are security threats
Symantec Enterprise Mobility Vision May 2012
Symantec Endpoint Suite
Symantec Advances Enterprise Mobility Strategy
8 Principales Raisons de Passer du MDM à l'EMM
Mobile malware and enterprise security v 1.2_0
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Simple and secure mobile cloud access
Securing mobile apps in a BYOD world
Whitepaper - CISO Guide_6pp
Ad

More from MarketingArrowECS_CZ (20)

PDF
INFINIDAT InfiniGuard - 20220330.pdf
PDF
Využijte svou Oracle databázi na maximum!
PDF
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
PDF
Chráníte správně svoje data?
PDF
Oracle databáze – Konsolidovaná Data Management Platforma
PDF
Nové vlastnosti Oracle Database Appliance
PDF
Infinidat InfiniGuard
PDF
Infinidat InfiniBox
PDF
Novinky ve světě Oracle DB a koncept konvergované databáze
PDF
Základy licencování Oracle software
PDF
Garance 100% dostupnosti dat! Kdo z vás to má?
PDF
Využijte svou Oracle databázi naplno
PDF
Oracle Data Protection - 2. část
PDF
Oracle Data Protection - 1. část
PDF
Benefity Oracle Cloudu (4/4): Storage
PDF
Benefity Oracle Cloudu (3/4): Compute
PDF
InfiniBox z pohledu zákazníka
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
PDF
Úvod do Oracle Cloud infrastruktury
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars

Zabezpečení mobilních zařízení ve firemním prostředí

  • 1. ZABEZPEČENIE MOBILNÝCH ZARIADENÍ VO FIREMNOM PROSTREDÍ Ján Kvasnička Senior Pre-Sales Consultant, Czech Republic and Slovakia
  • 2. THE CHALLENGES OF MOBILITY MOVE BEYOND THE DEVICE Copyright © 2015 Symantec Corporation 2 Information must be protected no matter where it resides Protecting sensitive information takes priority over protecting devices INFORMATION IS EVERYWHERE The number of mobile threats is on the rise Exposure to malware and risky apps RISE OF MOBILE THREATS Users adopt personal apps to improve productivity Data leaks to unauthorized, cloud- based apps MOBILE APPS Multiple platforms with disparate controls Users want the latest technology and apps ADVENT OF MOBILE AND BYOD
  • 3. THE NUMBER OF MOBILE THREATS IS ON THE RISE Copyright © 2015 Symantec Corporation 3 Classified as Malware Classified as Grayware Further classified as Madware 1.4 M 0.7 M 0.2 M 2.3 M 2.2 M 1.4 M 1.3 M 1.2 M 0.6 M OF THE 6.3 MILLION APPS ANALYZED IN 2014, 1 MILLION WERE CLASSIFIED AS MALWARE AND 2.3 MILLION WERE CLASSIFIED AS GRAYWARE Source: Symantec ISTR 2015
  • 4. CAUSES OF MOBILE THREATS BY CLASSIFICATION Copyright © 2015 Symantec Corporation 4 Send Content Adware Annoyance Reconfigure Device Traditional Threats Steal Information Track User 26% TRADITIONAL THREATS – Backdoor Trojans, Downloaders, DDoS Utility, etc. 22% TRACK USER – Threats that spy on users, tracks user locations 21% STEAL INFORMATION - Steal device data, media files, and any user credentials Source: Symantec ISTR 2015
  • 5. SYMANTEC IS ADJUSTING TO MEET CUSTOMER NEEDS Copyright © 2015 Symantec Corporation 5 Stop malicious mobile threats Protect your sensitive information, wherever it resides
  • 6. SYMANTEC MOBILITY SUITE Copyright © 2015 Symantec Corporation 6 MOBILITY: SUITE MOBILITY: DEVICE MANAGEMENT MOBILITY: APPLICATION MANAGEMENT MOBILITY: WORKFORCE APPS MOBILITY: THREAT PROTECTION
  • 7. MOBILE DEVICE MANAGEMENT Copyright © 2015 Symantec Corporation 7 Activate enterprise access easily and automatically ENABLE SECURE Enforce device policies and compliance MANAGE Visibility and reporting with web-based management Enable, secure, and manage your heterogeneous mobile environment
  • 8. MOBILE APPLICATION MANAGEMENT Copyright © 2015 Symantec Corporation 8 Symantec’s Enterprise App Store is end-user and IT friendly MOBILIZE APPS & CONTENT PROTECT INFORMATION Extend enterprise security policies Integration with DLP SOLVE FOR BYOD Clear separation of corporate and personal data MOBILE APP
  • 9. MOBILIZE APPS AND CONTENT Copyright © 2015 Symantec Corporation 9 ENTERPRISE APP STORE • Distribute/update/revoke specific apps/content • Web, native, HTML5 – in-house, external apps • PDF’s, videos, ePub documents, forms END-USER AND IT FRIENDLY • Consumer-style portal, reviews, screenshots • Corporate branding • Versioning and expiration options
  • 10. PROTECT INFORMATION ON MOBILE APPS Copyright © 2015 Symantec Corporation 10 ENTERPRISE SECURITY POLICIES • Authentication: LDAP/SAML – online, offline access • Encryption: FIPS 140-2, AES 256 – for all selected data • Data Loss Prevention: copy-paste, sharing restrictions SAFELY EXTEND ENTERPRISE RESOURCES • App Proxy secures app data in transit • Email Proxy prevents unauthorized access to Exchange • No firewall holes or device-wide VPN SYMANTEC APP WRAPPING TECHNOLOGY • No developer resources required • No additional infrastructure required • No delays on mobile app rollouts App wrapped with Symantec libraries and policy controls
  • 11. SOLVE FOR BYOD Copyright © 2015 Symantec Corporation 11 ALLOW PERSONAL DEVICES • Secure access to corporate information • Auto-configuration of settings like Wi-Fi and VPN • Lock and wipe only specific corporate data END-USER AND IT FRIENDLY • No device level controls • No monitoring of device apps or data • Focus on corporate apps and data A clear separation of corporate and personal data
  • 12. WORKFORCE APPS Copyright © 2015 Symantec Corporation 12 MOBILITY: WORKFORCE APPS WORK MAIL A secure email/PIM app WORK WEB A secure browser for websites and apps
  • 13. WORK MAIL Copyright © 2015 Symantec Corporation 13 • Automatically configure and sync Email, Calendar, Contacts, Tasks, and Notes • Rich integration with Exchange ActiveSync (EAS) • Push Notifications • Simplified Enrollment • AES-256 Encryption for all data and SD card • Password policy management • Attachment policies and secure storage • Support S/MIME signing and encryption A secure app for email/PIM
  • 14. WORK WEB Copyright © 2015 Symantec Corporation 14 • Enable secure access to web-based corporate resources • Whitelist URLs that may be opened in the web browser • Require internal websites and web-based apps to open in Work Web • Pre-configure web bookmarks for employees • Restrict copy/paste of data and open-in attachments to unapproved apps • Leverage secure app proxy as a virtual network gateway for incoming traffic • Perform safe web searches powered by Norton Safe Search A secure browser for accessing websites and apps
  • 15. THREAT PROTECTION Copyright © 2015 Symantec Corporation 15 Advanced, proactive protection against risky apps APP ADVISOR ANTI-MALWARE Protect against latest threats with Live-Update Compliance rules based on device security posture WEB PROTECTION Detect and block phishing websites
  • 16. APP RISK REPORTING POWERED BY NORTON MOBILE INSIGHT Copyright © 2015 Symantec Corporation 16 200+ APP STORES Crawled continuously 30K NEW APPS Processed every 24 hours 15M ANDROID Android apps in our database 800K APPS With medium or high battery or data usage 3M MALICIOUS Apps identified 90M APPS With potential privacy leaks or intrusive behaviors
  • 17. APP ADVISOR IDENTIFIES RISKY APPS • Apps that leak information • Apps that drain battery • Apps that consume too much bandwidth • Proactive protection before download from Google Play • Enable users to make informed decisions about apps
  • 18. Copyright © 2015 Symantec Corporation 18
  • 19. Copyright © 2015 Symantec Corporation 19
  • 20. Copyright © 2015 Symantec Corporation 20
  • 21. PROTECT AGAINST MALICIOUS THREATS ANTI-MALWARE • Fast and effective on-device scans • Protect against latest threats with Live-Update integration • Implement compliance rules based on device security posture WEB PROTECTION • Detect and block phishing websites • Enable safe mobile browsing
  • 22. SYMANTEC’S MOBILE VISION AND STRATEGY Copyright © 2015 Symantec Corporation 22 THREAT PROTECTION INFORMATION PROTECTION INTEGRATE SYMANTEC’S MOBILE TECHNOLOGY INTO BROADER SOLUTIONS TO HELP YOU PROTECT YOUR SENSITIVE INFORMATION AND PROTECT AGAINST THREATS
  • 23. THANK YOU! Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Ján Kvasnička [email protected]