
Symantec Mobile Threat Defense
Mobile data security software
Data security software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Symantec Mobile Threat Defense and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Media and communications
- Professional services (engineering, legal, consulting, etc.)
- Retail and wholesale
What is Symantec Mobile Threat Defense
Symantec Mobile Threat Defense is a mobile security product designed to detect and help remediate threats affecting smartphones and tablets, including risky apps, network-based attacks, and device compromise indicators. It is typically used by enterprise security and IT teams to protect corporate data on managed or BYOD mobile endpoints. The product is commonly deployed alongside enterprise mobility management and broader endpoint/security operations tooling. It focuses on mobile-specific threat telemetry and policy-driven response actions such as alerting, user guidance, and access control integration.
Mobile-focused threat detection
The product targets threats that are specific to mobile endpoints, such as malicious or risky applications, unsafe Wi‑Fi/network conditions, and signs of device compromise. This helps security teams cover gaps that traditional endpoint tools may not address well on iOS and Android. It supports use cases where mobile devices access corporate email, SaaS apps, and internal resources.
Policy-based response workflows
It supports policy-driven actions that can guide users and trigger remediation steps when risk is detected. In enterprise deployments, this commonly includes alerting, user notifications, and conditional access patterns when integrated with access or device-management controls. This aligns with how organizations operationalize mobile risk in security operations.
Enterprise security program fit
Symantec-branded mobile threat defense is positioned for organizations that already run centralized security governance and want mobile telemetry included in their broader security posture. It is typically evaluated as part of a wider data protection and endpoint security stack rather than as a standalone consumer tool. This can simplify vendor management for enterprises standardizing on a single security provider.
Brand and ownership complexity
The Symantec brand has changed ownership across different product lines over time, which can create confusion about the current seller, support model, and roadmap for specific offerings. Buyers often need to validate which legal entity provides the service and how it is licensed and supported. This can lengthen procurement and due diligence compared with more clearly single-owner products.
Integration dependencies for enforcement
Many enforcement outcomes (for example, blocking access to corporate resources based on device risk) typically require integration with identity, VPN, or device management platforms. Without these integrations, the product may be limited to detection and user guidance rather than automated containment. Organizations should confirm supported integrations and the effort required to implement them.
Limited public product detail
Publicly available, current documentation and packaging details for Symantec Mobile Threat Defense can be harder to validate than for some other mobile security products. This can make it more difficult to confirm feature parity, supported OS versions, and deployment options during evaluation. Prospective customers may need to rely more heavily on vendor-led demos and contractual documentation.
Plan & Pricing
| Plan | Price | Key features & notes |
|---|---|---|
| Contact sales / Custom | Contact Broadcom (Symantec) sales or authorized partner for pricing | Official Broadcom/Symantec site does not publish public list prices for Symantec Mobile Threat Defense / SEP Mobile; licensing and SKUs are managed through Broadcom pricebooks and partners. See notes below. |
Seller details
Broadcom Inc.
Palo Alto, California, USA
1961
Public
https://www.broadcom.com/
https://x.com/Broadcom
https://www.linkedin.com/company/broadcom/