4 security suites that protect all your devices
McAfee, Symantec, Trend Micro and Webroot offer protection for all your devices plus Web-based management.
Computerworld - Security is no longer a one-machine affair. Most people today use two or more devices -- for example, you could be using a work desktop, a personal laptop, a tablet and a smartphone. And it's possible, if not probable, that you're using two or more operating systems, such as Windows, OS X, Android, iOS or Windows Phone.
No matter what devices you use, you can be sure of one thing: The bad guys are out to get you. There's a lot of malware out there, and it's targeting almost every operating system available. That means you -- and your family -- need multi-device protection.
In earlier days, protection for non-Windows devices didn't seem important. People believed that Macs were safe from attack, while smartphones weren't being targeted by malware. Today, though, it's clear that no matter what device you use, you need to make sure it's secure.
While there are a number of individual products out there that can help with that task, there are also several anti-malware suites that encourage you to think of security in a holistic way, rather than just device-by-device. For a single price, you buy protection for multiple devices -- for example, two Windows-based PCs, one Mac, an Android smartphone and an iPad.
These suites typically cost more than a single-OS version (which usually protects up to three machines), and so if you only use the suites to protect two devices, you may not save any money. However, if you're protecting five of them, the savings can add up quickly. For example, a copy of Norton 360 provides one year of protection for three Windows PCs for $59.99, while Norton 360 Everywhere, which offers protection for five devices (Windows, OS X or Android) costs $99.99.
But wait, there's more: Besides offering multiple pieces of software for a single price, there's a new way of managing the security on all of your devices -- from the cloud. A Web-based management interface lets you see which devices are protected by which software, install software directly from the site, and in some cases remotely configure the protection on various devices.
In this roundup, I examine four such suites: McAfee All Access, Norton One, Trend Micro Titanium Maximum Security 2012 and Webroot SecureAnywhere Complete. (There are other suites, such as Kaspersky One, that include multi-device protection but don't include a common Web-management interface and therefore aren't included in this roundup.)
I installed the appropriate versions on a Windows-7 based PC, a Mac running OS X 10.7.4, and a Motorola Droid X smartphone with Android 2.3.4 (Gingerbread). Since I don't own an iPhone, the iOS apps were tested by Computerworld staffers Johanna Ambrosio and Valerie Potter.
We looked at the interface of each application and what features were available. I also looked at the main Web interface of each package to see what it offered and how well it operated.
The suites each provide protection for some combination of PCs, Macs and mobile devices, with the exact devices and combination varying somewhat for each. In each review, I'll tell you which devices the suite supports, and the limit (if any) on how many devices you can protect.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts