Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/20/2012
10:44 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec To Acquire Mobile App Management Company Nukona

Acquisition complements Symantec's acquisition earlier this month of Odyssey Software

MOUNTAIN VIEW, Calif. - Mar. 20, 2012 - Symantec Corp. (Nasdaq: SYMC) today announced it has signed a definitive agreement to acquire Nukona, Inc., a privately-held provider of mobile application management (MAM). The acquisition extends Symantec's enterprise mobility portfolio to include a cross-platform mobile application protection solution to help IT organizations protect and isolate corporate data and applications across both corporate owned and personally owned devices. The transaction is expected to close in April and is subject to customary closing conditions. The financial terms of the acquisition are not being disclosed.

Read more detailed blog post: . Major Mobility Milestone for Symantec

The acquisition of Nukona complements Symantec's acquisition earlier this month of Odyssey Software, a leading provider of mobile device management (MDM). Odyssey provides the MDM foundation to enroll and manage all necessary device settings across a broad range of platforms, while Nukona provides an innovative approach to help enterprises seamlessly distribute, secure and control applications and data without requiring them to manage the devices. By offering both MDM and MAM across multiple platforms, Symantec will enable CIOs to say "yes" to the onslaught of digital natives - people born in a world of connectivity - demanding to use devices and apps of their choice. Symantec will help customers secure enterprise critical mobile apps and data while managing and protecting them with policies, including authenticating users, encrypting sensitive files, preventing data leakage and selectively wiping corporate data. These acquisitions further advance Symantec's enterprise mobility leadership by enhancing capabilities for mobile device, application and data protection.

"As the adoption of mobile devices and apps continues to grow at an unprecedented rate, one of the biggest challenges for customers is to protect and manage the native apps, data and environments of these devices," said CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec. "The acquisition of Nukona helps us further address the 'Consumerization of IT' and 'Bring Your Own Device' trends by helping organizations protect and isolate corporate data and applications across both corporate owned and personally owned devices."

Click to Tweet: Symantec extends mobile application management capabilities and complements MDM with acquisition of Nukona: http://bit.ly/FQitbn

With Nukona's ability to natively protect and control iOS, Android and HTML5 apps, Symantec will address the core problem of corporate and personal data separation without limiting the end-user experience or application adoption. By securely distributing and managing mobile applications and content, Symantec customers will be able to address corporate data security concerns around data leakage, encryption and authentication on a per-application basis, for both BYOD and corporate owned devices.

Unlike traditional proprietary sandbox solutions, Symantec's approach will extend application protection that "wraps" both native and web-based apps with a management layer that allows IT to apply security policies without requiring any changes to the applications, leaving personal apps and activities untouched. In addition, the flexibility of cloud-based and on-prem enterprise app stores helps provide a seamless and scalable way to enable mobile application deployments. Nukona's secure content library also allows for the protection and synchronization of documents without risk of data loss.

According to Symantec's recent State of Mobility Survey, the average annual cost of mobile incidents for enterprises, including data loss, damage to the brand, productivity loss and loss of customer trust, was USD$429,000. However, despite the risks, an uptick in mobile applications across organizations is taking place with 71 percent of enterprises at least discussing deploying custom mobile applications and one-third currently implementing or having already implemented custom mobile applications. In addition, 59 percent of enterprises are making line-of-business applications accessible from mobile devices, representing a dramatic shift in the nature of mobility from an email extension to a core business enabler.

For more information, go to http://go.symantec.com/Nukona_Odyssey.

Related . Blog: Major Mobility Milestone for Symantec . Blog: Advancing Symantec's Enterprise Mobility Strategy: New Innovations Unveiled . Symantec Mobile Solutions . Research: 2012 State of Mobility Survey . Research: A Window Into Mobile Device Security . Research: Motivations of Recent Android Malware

Connect with Symantec . Follow Symantec Endpoint Management and Mobility on Twitter . Follow Symantec on Twitter . Join Symantec on Facebook . Read Industry Trends on Delicious . View Symantec's SlideShare Channel . Subscribe to Symantec News RSS Feed . Visit Symantec Connect Business Community

About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...