Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

Symantec Rolls Out Mobile Security Assessment Suite

Solution consists of two modules

MOUNTAIN VIEW, Calif. – Dec. 5, 2011 – Symantec Corp. (Nasdaq: SYMC) today announced the Symantec Mobile Security Assessment Suite, a set of services that help enterprises evaluate their mobile security postures and develop defenses against mobile threats and vulnerabilities. Leveraging Symantec’s extensive knowledge base and deep technical and operational skill sets, the Symantec Mobile Security Assessment Suite provides enterprises with strategic and tactical recommendations for the secure deployment of mobile devices and applications.

Click to Tweet: Symantec unveils Mobile Security Assessment Suit to help enterprises evaluate mobile risk readiness: http://bit.ly/sx1m2K

The exploding use of mobile devices and mobile applications within enterprises creates a unique set of challenges that must be addressed in order to ensure sensitive information accessed, stored and transmitted is properly protected. These challenges have left many organizations wondering how to manage the risks associated with these devices, transitioning them from simply consumer devices on the enterprise network to properly managed and protected endpoints.

“When it comes to implementing mobile technology, enterprises are being thrown into the fire,” said Clint Sand, senior director of the Security Business Practice at Symantec. “Enterprises know that security is the main impediment for broader adoption of mobility, but with all the changes in operating systems and applications, IT managers are unclear on how to comprehensively address the security challenges. We want to help these organizations with an assessment of their security posture and make recommendations on the best ways to embrace BYOD.”

Symantec Mobile Security Assessment Suite uses a solution oriented approach based on Symantec’s exclusive Mobile Security Framework. It consists of two modules; one for holistic assessment of enterprise mobile security, and one specifically focused on mobile application security.

Symantec Mobile Security Assessments evaluate the level of risk inherent in the enterprise use of mobile computing devices, such as the Apple iPhone, iPad, or Android phones and tablets. The assessments provide an understanding of present or anticipated exposure to information security risk likely to result from gaps within the information security programs, policies and processes, based on mobile device use cases and available security controls. Symantec Mobile App Security Assessments evaluate the security of an organization’s custom mobile applications against best practice criteria for mobile application security. By simulating real-world device operating system and application-level attacks, the tests provide insight into the ability of an organization’s mobile applications to resist attacks from unauthorized users and to help prevent misuse by valid users.

After completion of the assessments, Symantec delivers a written report which includes an executive summary, showing the high-level analysis and findings, a scorecard illustrating the organization’s mobile security readiness, detailed findings and recommendations, and prioritized action plans for closing any gaps that may exist. Enterprises can use the final report to formalize their mobile strategies and deployment plans around mobile device management, mobile data loss prevention, mobile encryption, mobile anti-virus and mobile authentication.

Availability

The Symantec Mobile Security Assessment Suite is currently available. These services can be purchased directly from Symantec.

Resources

Symantec Mobile Security Assessment Suite Symantec Mobile Solutions Podcast: A Holistic Approach to Mobile Security Research: A Window Into Mobile Device Security

Connect with Symantec

Follow Symantec Endpoint Management and Mobility on Twitter

Follow Symantec on Twitter

Join Symantec on Facebook

Read Industry Trends on Delicious

View Symantec’s SlideShare Channel

Subscribe to Symantec News RSS Feed

Visit Symantec Connect Business Community

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...