Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Symantec’s Mobile Security Suite Misses Mark

    Written by

    Andrew Garcia
    Published November 2, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Symantec’s Mobile Security Suite 5.0 provides a good mix of security features for devices based on Microsoft’s Windows Mobile 5.0, but the product ultimately misses the mark due to clumsy management tools and a complete lack of integrated cross-platform support that would certainly be compelling in an increasingly crowded but compartmentalized marketplace.

      Mobile Security Suite 5.0 for Windows Mobile builds atop Symantec’s core of device-based anti-virus and firewall features with new on-device folder encryption, device lock, tamper protection and network access control capabilities.

      With both mobile operating system makers and mobile device manufacturers pushing new security platforms onto the market, the door is open for an ISV such as Symantec to make some hay with a powerful cross-platform solution that would help mobile administrators effectively secure their myriad devices with a single solution.

      However, while Symantec does offer separate security products for the common open mobile platforms Windows Mobile and Symbian, I’m simply not seeing any real signs of integration between the two products. Both platforms have different management tools for policy creation, assignment and enforcement.

      Microsoft wants to build a mobile device application platform as ubiquitous as Windows is on desktop PCs. Click here to read more.

      Symantec has started down the road toward integrating its Windows Mobile solution with its familiar anti-virus management console, the Symantec System Center, or SSC. In my tests, I was able to monitor the security posture of my Windows Mobile clients, getting familiar at-a-glance visibility into virus activity and signature downloads. However, I needed to make sure I was running the most recent version of the SSC to get there.

      Policy creation and assignment, meanwhile, is performed using a separate application—MSM (Mobile Security Manager). From this Windows-based application, I could create packages that tie together seven distinct policies: four firewall policies for different network types, a security policy that allows the administrator to disable device features such as the camera or Bluetooth, an intrusion prevention policy, and an integrity manager policy that monitors the health and uptime of the security software’s components and processes.

      Policy management is truly a clumsy affair in MSM, however. I found the various creation and assignation tools confusing. While I found it fairly straightforward to create and apply a new policy, policy controls were confusing thereafter. Because policies can be applied to individual users and devices or to groups of users, I found myself losing track of where the policy was initially applied, as the MSM tools do not adequately depict policy inheritance. This could be solved by an additional reporting interface that shows the relevant objects to which a policy has been assigned.

      The software packages themselves are meant to be distributed using a third-party MDM (Mobile Device Management) solution such as Nokia’s Intellisync or Sybase iAnywhere’s Afaria. However, distribution can be done on a device-by-device basis using Microsoft’s ActiveSync in a pinch.

      Once the software packages—which include a Symantec Mobile Agent configured to phone home periodically to the MSM via an SSL (Secure Sockets Layer)-encrypted connection—are distributed, the client can download new policy packages and signature updates without the MDM.

      Symantec bolsters its managed security portfolio. Click here to read more.

      The MSM also has limited reporting capabilities: For example, I could pull up some vanilla reports on all events, firewall activity or quarantine events.

      There are two versions of Mobile Security for Windows Mobile: a standard edition that includes anti-virus capabilities, a firewall and SMS (Short Message Service) anti-spam capabilities, priced starting at $40 per device, and a $70 premium edition that builds atop the services included in the standard edition with added capabilities for on-device encryption, device lock, loss mitigation, network access control and tamper protection. Both versions work only with Microsoft’s Windows Mobile 5.0, which will be a significant drawback as Windows Mobile 6.0 gains traction in the market.

      Separately, Symantec sells the Symantec Mobile VPN client for $80 per device. The client works with Cisco Systems and Nortel Networks VPN concentrators. With the Mobile VPN client installed, I could enforce a Symantec-proprietary version of NAC (network access control) that automatically ensured security services were working and up-to-date before allowing a device onto the network.

      Symantec officials acknowledge that the NAC feature is not currently compatible with the commonly known NAC frameworks (Cisco’s Network Admission Control, Microsoft’s Network Access Protection and Trusted Computing Group’s Trusted Network Control). However, the company is working toward getting its solution to leverage the fruits of its 2006 Sygate acquisition.

      Page 2: Mobile Security Misses Mark

      Microsoft’s Windows Mobile remains pretty quiet on the virus front. During the month and a half that we tested the product, not a single new virus definition file was released. (The last release was in mid-July.) Indeed, when examining the protection features on the device, we discovered signatures for only six malware variants, and one of those was the Eicar test virus.

      In tests using Eicar virus samples, Symantec’s product was able to detect and quarantine the samples—but not necessarily in the way I expected. If I downloaded the virus directly to the device, I received a nonintuitive error message saying the device had no storage space remaining, but the virus was blocked before it could be saved to storage. However, if the virus was in a .zip file, I could then download it (meaning that the Symantec product failed a test that desktop anti-virus solutions have been able to solve for years). Only when I extracted the virus from the .zip file could Symantec’s active protections sweep it into quarantine—after a few seconds.

      Mobile Security Suite 5.0 also lets administrators require a device lock (either a PIN or an alphanumeric password) for accessing the device interface. Then, when a device boots or wakes from a period of inactivity, the user must enter the password or PIN within a predefined number of attempts.

      My policy was set to lock down the device after 10 incorrect log-ins. After the 10th failed attempt, the device automatically erased its data and then conducted a hard reset that removed all installed applications. Once the device completed the reset, it was in its pristine state—devoid of data and applications.

      Device encryption also worked well. Administrators can centrally allow encryption for smart cards via policy, while users can point the software to folders they want encrypted. (The folders are protected with a password.) I could also set the encryption to encompass contacts, e-mail and other information when a device was powered down, but this will add to the device’s boot and shutdown times because encryption has to be done on the fly.

      Check out eWEEK.com’s Mobile & Wireless Center for the latest news, reviews and analysis on mobile and wireless computing.

      Andrew Garcia
      Andrew Garcia
      Andrew cut his teeth as a systems administrator at the University of California, learning the ins and outs of server migration, Windows desktop management, Unix and Novell administration. After a tour of duty as a team leader for PC Magazine's Labs, Andrew turned to system integration - providing network, server, and desktop consulting services for small businesses throughout the Bay Area. With eWEEK Labs since 2003, Andrew concentrates on wireless networking technologies while moonlighting with Microsoft Windows, mobile devices and management, and unified communications. He produces product reviews, technology analysis and opinion pieces for eWEEK.com, eWEEK magazine, and the Labs' Release Notes blog. Follow Andrew on Twitter at andrewrgarcia, or reach him by email at [email protected].

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×