This page contains a Flash digital edition of a book.
Keep Your Files Out of Their Hands


Are Your Mobile Devices Secure?


Symantec Mobile Management (SMM) is a scalable MDM platform you can rely on to enable, secure, and manage mobile devices. SMM helps with mobile email and application rollouts, safeguards mobile data and devices, and provides comprehensive visibility and control of the mobile environment. Built on an enterprise-proven and globally deployed platform, SMM provides the scalability and robustness you need to mobilize with confi dence.


 Policy controls from passwords and remote wipe to application restrictions and certifi cate distribution


 Comprehensive visibility and control over Apple iPhones and iPads, Android-based tablets, and other popular mobile devices  User-friendly enrollment, deployment, and confi guration process


It’s Not Your PC, It’s Your Everything Intel®


Anti-Theft Technology (Intel® Core™


AT) delivers intelligent,


automated, policy-based protection against notebook loss or theft and helps secure sensitive data, so businesses can minimize risk and improve compliance with strict new regulations. Intel® available on select 3rd generation Intel® Intel®


AT is and 3rd generation Core™ vPro™ with a service subscription from an Intel® Well-Rounded Protection


McAfee Content Security Suite bundles McAfee Web Protection, McAfee Email Protection, McAfee Network DLP Prevent, and McAfee Device Control into a one-suite purchase. This unifi ed approach offers the right security to protect your users and data from today’s inbound and outbound threats.


 Protects against blended and targeted malware attacks  Eliminates spam, malware, phishing attacks, and more threats  Reduces bandwidth and malware cleanup costs while increasing employee productivity  Prevents loss of both structured and unstructured data  Assists in achieving compliance


processor family–based notebooks when activated AT–enabled service.


 Minimizes the potential of a stolen notebook being used and sensitive data being accessed by an unauthorized person  Detects suspicious behavior—such as excessive login attempts or failure to connect to the theft-monitoring server at regular intervals— and triggers theft mode  Locks down stolen or lost notebooks at the hardware level without harming your software or data  Protects encrypted data from access, even if the unauthorized user knows the passcodes or in situations when a password has been compromised  Displays a customized warning message to aid in recovery  Easily and quickly reactivates your PC, software, and data when your notebook is recovered


For more information on Intel® Anti-Theft Technology, contact your Account Manager today! 8 IT for healthcare™


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36