The world’s population today is a little over 7 billion. Cisco estimates that by the year 2020, there will be 50 billion network devices on the earth. That’s 7 per person! With mobile technology proliferating at such a quick pace, the issue of mobile security needs to be revisited.

Mobile devices are increasingly being used to access sensitive data and in sensitive work situations. For the last ten years, the FAA has been telling us to “stow all electronic devices when we got on the plane”. IT professionals held this up as a policy that would never change. The FAA announced several months ago that they have begun the testing and certification of mobile devices. They’re here and they’re not going away folks.

tablet with chain and lock It’s clear that mobile security is becoming a necessity, with the BYOD (Bring Your Own Device) trend being its largest driver and the number of small businesses that are accepting this trend increasing. According to the recent Cisco IBSG Horizons Study of 600 US IT and business leaders, 95% of respondents said their organization permits employees to bring personal devices to work to access office data. IT managers seem to be balancing the threat of security issues with the benefit of saving money by limiting company technology purchases.

To protect against the threat of infiltration of company data, Symantec has developed a comprehensive set of mobile management security products. Businesses can now embrace the BYOD trend knowing that all the correct security measures are in place.

 Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. Updates to this product include a secure email solution for Android devices with NitroDesk TouchDown integration as well as enterprise grade management supporting Windows 7 Phone platforms. For a complete list of products and new capabilities, visit http://www.symantec.com/mobile-device-security.

At SAI, we want to ensure that you are supporting your users but reducing your IT operating risks. Let me know if you’re interested in learning more.