Enviar pesquisa
Carregar
Mobile security 8soft_final_summercamp2011
•
Transferir como ODP, PDF
•
0 gostou
•
804 visualizações
Z
Zarafa
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 22
Baixar agora
Recomendados
Mobile Security
Mobile Security
MarketingArrowECS_CZ
Mobile phone security
Mobile phone security
Er aditya kumar jha
Smart phone and mobile device security
Smart phone and mobile device security
CAS
Mobile security
Mobile security
home
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
Mobile Security 101
Mobile Security 101
Lookout
Him
Him
Himanshu Kumar Paswan
Cp3201 mobile security final
Cp3201 mobile security final
FinTech startup in stealth mode
Recomendados
Mobile Security
Mobile Security
MarketingArrowECS_CZ
Mobile phone security
Mobile phone security
Er aditya kumar jha
Smart phone and mobile device security
Smart phone and mobile device security
CAS
Mobile security
Mobile security
home
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
Mobile Security 101
Mobile Security 101
Lookout
Him
Him
Himanshu Kumar Paswan
Cp3201 mobile security final
Cp3201 mobile security final
FinTech startup in stealth mode
Mobile security by Tajwar khan
Mobile security by Tajwar khan
Tajwar khan
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
Mobile virus & worms
Mobile virus & worms
Sourav Verma
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Security threats facing SA businessess
Security threats facing SA businessess
SensePost
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
News Bytes - December 2012
News Bytes - December 2012
n|u - The Open Security Community
Mobile device security
Mobile device security
Lisa Herrera
Tt 06-ck
Tt 06-ck
Narinrit Prem-apiwathanokul
Spy android malware - eScan
Spy android malware - eScan
MicroWorld Software Services Pvt Ltd
Raimund genes from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
Graeme Wood
Piracy and Types
Piracy and Types
Syed Muhammad Shah
Malicious malware breaches - eScan
Malicious malware breaches - eScan
MicroWorld Software Services Pvt Ltd
Virus09
Virus09
defler
Port security
Port security
borepatch
Smartphone security
Smartphone security
Muthu Kumar
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
IOSR Journals
5 spy software
5 spy software
Ahmed Kamel Taha
pegasus spyware
pegasus spyware
national forensic science university
How SMEM Evolved
How SMEM Evolved
Dawn Dawson
Madininair
Madininair
Joseph Nodin
Mais conteúdo relacionado
Mais procurados
Mobile security by Tajwar khan
Mobile security by Tajwar khan
Tajwar khan
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
Mobile virus & worms
Mobile virus & worms
Sourav Verma
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
Security threats facing SA businessess
Security threats facing SA businessess
SensePost
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
News Bytes - December 2012
News Bytes - December 2012
n|u - The Open Security Community
Mobile device security
Mobile device security
Lisa Herrera
Tt 06-ck
Tt 06-ck
Narinrit Prem-apiwathanokul
Spy android malware - eScan
Spy android malware - eScan
MicroWorld Software Services Pvt Ltd
Raimund genes from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
Graeme Wood
Piracy and Types
Piracy and Types
Syed Muhammad Shah
Malicious malware breaches - eScan
Malicious malware breaches - eScan
MicroWorld Software Services Pvt Ltd
Virus09
Virus09
defler
Port security
Port security
borepatch
Smartphone security
Smartphone security
Muthu Kumar
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
IOSR Journals
5 spy software
5 spy software
Ahmed Kamel Taha
pegasus spyware
pegasus spyware
national forensic science university
Mais procurados
(20)
Mobile security by Tajwar khan
Mobile security by Tajwar khan
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Mobile virus & worms
Mobile virus & worms
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Security threats facing SA businessess
Security threats facing SA businessess
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
News Bytes - December 2012
News Bytes - December 2012
Mobile device security
Mobile device security
Tt 06-ck
Tt 06-ck
Spy android malware - eScan
Spy android malware - eScan
Raimund genes from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
Piracy and Types
Piracy and Types
Malicious malware breaches - eScan
Malicious malware breaches - eScan
Virus09
Virus09
Port security
Port security
Smartphone security
Smartphone security
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
5 spy software
5 spy software
pegasus spyware
pegasus spyware
Destaque
How SMEM Evolved
How SMEM Evolved
Dawn Dawson
Madininair
Madininair
Joseph Nodin
Spectrum Gaming Group, Independent Research and Professional Services
Spectrum Gaming Group, Independent Research and Professional Services
Market Engel SAS
Pricelist premium italian qts range
Pricelist premium italian qts range
INSHA EXPORTS PVT LTD
Medical devices from patients' perspectives
Medical devices from patients' perspectives
Hungarian Osteoporosis Patient Association
Usaha
Usaha
196365
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
Rolf Kremer
Destaque
(7)
How SMEM Evolved
How SMEM Evolved
Madininair
Madininair
Spectrum Gaming Group, Independent Research and Professional Services
Spectrum Gaming Group, Independent Research and Professional Services
Pricelist premium italian qts range
Pricelist premium italian qts range
Medical devices from patients' perspectives
Medical devices from patients' perspectives
Usaha
Usaha
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
Enterprise Atom/RSS Information distribution with IBM Lotus Notes/Domino
Semelhante a Mobile security 8soft_final_summercamp2011
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
cellphone virus and security
cellphone virus and security
Akhil Kumar
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
Information security
Information security
Appin Faridabad
Mobile Malware
Mobile Malware
Martin Holovský
Computer and network security
Computer and network security
Karwan Mustafa Kareem
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Bee_Ware
Information security in todays world
Information security in todays world
Sibghatullah Khattak
Treads to mobile network
Treads to mobile network
RAVITEJA828
Cn35499502
Cn35499502
IJERA Editor
C3
C3
Praveen Malisetty
Network monitoring white paper
Network monitoring white paper
Imaging Network Technology, LLC
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
Info security - mobile approach
Info security - mobile approach
EY Belgium
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Innovation Network Technologies: InNet
Pocket virus threat
Pocket virus threat
Ali J
Introduction to security
Introduction to security
Mostafa Elgamala
Introduction to security
Introduction to security
Mostafa Elgamala
Smartphone
Smartphone
Naval OPSEC
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
defconmoscow
Semelhante a Mobile security 8soft_final_summercamp2011
(20)
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
cellphone virus and security
cellphone virus and security
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
Information security
Information security
Mobile Malware
Mobile Malware
Computer and network security
Computer and network security
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Information security in todays world
Information security in todays world
Treads to mobile network
Treads to mobile network
Cn35499502
Cn35499502
C3
C3
Network monitoring white paper
Network monitoring white paper
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Info security - mobile approach
Info security - mobile approach
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Pocket virus threat
Pocket virus threat
Introduction to security
Introduction to security
Introduction to security
Introduction to security
Smartphone
Smartphone
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
Mais de Zarafa
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa
Zarafa SummerCamp 2012 - Android Workshop
Zarafa SummerCamp 2012 - Android Workshop
Zarafa
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
Zarafa
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
Zarafa
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa
Zarafa SummerCamp 2012 - Yubikey integration
Zarafa SummerCamp 2012 - Yubikey integration
Zarafa
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
Zarafa
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
Zarafa
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
Zarafa
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
Zarafa
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
Zarafa
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
Zarafa
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
Zarafa
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
Zarafa
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
Zarafa
Zarafa SummerCamp 2012 - Open Generation Gap
Zarafa SummerCamp 2012 - Open Generation Gap
Zarafa
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
Zarafa
Zarafa SummerCamp 2012 - Zarafa 7.1 features
Zarafa SummerCamp 2012 - Zarafa 7.1 features
Zarafa
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
Zarafa
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...
Zarafa
Mais de Zarafa
(20)
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Android Workshop
Zarafa SummerCamp 2012 - Android Workshop
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
Zarafa SummerCamp 2012 - Steve Hardy Friday Keynote
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
Zarafa SummerCamp 2012 - Project approach when migrating to Zarafa
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Yubikey integration
Zarafa SummerCamp 2012 - Yubikey integration
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
Zarafa SummerCamp 2012 - Exchange Web Services, technical information
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
Zarafa SummerCamp 2012 - Tips & tricks for running Zarafa is larger scale env...
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
Zararfa SummerCamp 2012 - HA, multi-tenancy and SSO in Zentyal 2 and 3.pdf
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
Zararfa SummerCamp 2012 - Debian packaging Giraffe and D-push
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
Zararfa SummerCamp 2012 - Fedora update & PAM-MAPI Zarafa Ready certified com...
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
Zararfa SummerCamp 2012 - Community update and Zarafa Development Process
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
Zararfa summer camp 2012 interesting tips & tricks when migrating to zarafa
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
Zarafa SummerCamp 2012 - Keynote Steve Hardy - 3 Cool innovations
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
Zarafa SummerCamp 2012 - Deploying Zarafa Archiver
Zarafa SummerCamp 2012 - Open Generation Gap
Zarafa SummerCamp 2012 - Open Generation Gap
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
Zarafa SummerCamp 2012 - Zarafa Cluster using a reverse proxy
Zarafa SummerCamp 2012 - Zarafa 7.1 features
Zarafa SummerCamp 2012 - Zarafa 7.1 features
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
Zarafa SummerCamp 2012 - Z-push 2.0 changes for administrators
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...
Zararfa SummerCamp 2012 - Performing fast backups in large scale environments...
Último
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Último
(20)
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Mobile security 8soft_final_summercamp2011
1.
Mobile Working With
Z-Push & BES – What About Risks? Jens Fell
2.
3.
bada, by Samsung
(a version with Linux-Kernel)
4.
BlackBerry, by RIM:
proprietary system with push technology
5.
Brew, by Qualcomm
6.
7.
MeeGo, initiative by
Nokia and Intel
8.
Mobilinux, by MontaVista
9.
Openmoko
10.
11.
Windows Phone and
Windows Mobile by Microsoft
12.
Statement No.
2 Everything, that happens to a laptop, can happen to a smartphone, too!
13.
14.
WiFi (W-LAN)
15.
Camera
16.
GPS
17.
SMS/MMS
18.
Email
19.
Apps
20.
Browser
21.
22.
23.
24.
25.
1046 modifications
26.
In November 2010,
45 new changes were discovered.
27.
28.
29.
Download: looks
as if it was a media player
30.
Sends SMS to
a premium account for $ 5 for each SMS
31.
32.
Stealthy sending of
SMS/MMS with high fees ( Trojan-SMS.J2ME.RedBrowser )
33.
Blocking functionalities of
the mobile phone ( Trojan.SymbOS.Skuller, Rommwar )
34.
Downloading of other
viruses ( Trojan.SymbOS.Doombot mit ComWar )
35.
Deleting data (
Trojan.SymbOS.Cardblock, Worm.MSIL.Cxover )
36.
Theft of data
( Worm.SymbOS.StealWar, Trojan-Spy.SymbOS.Flexispy )
37.
Using PCs for
further circulation ( Worm.MSIL.Cxover )
38.
39.
User receives a
file (mostly „sex.sis“) via bluetooth
40.
The phone works
but the battery discharges very fast (because Cabir uses bluetooth).
41.
42.
Operate a hard-reset
or install firmware again
43.
44.
45.
Execute
file
46.
Show folder content
47.
48.
Operate a hard-reset
or install firmware again
49.
50.
(tool for optimizing
the phonebook)
51.
First seen
in a Chinese forum
52.
Sends a file
with personal data of the user to all devices in range of coverage via bluetooth
53.
54.
Operate a hard-reset
or install firmware again
55.
56.
Blocks memory card
with a random password
57.
Damages all user
applications
58.
Deletes SMS and
MMS messages
59.
By deleting the
infected files, the infection itself will not be eliminated.
60.
The phone needs
to be reset. Attention: All data on the smart card will be lost!
61.
62.
About 100,000 mobile
devices are found in London's Underground.
63.
Not less than
one quarter of all mobile phones of a company contains confidential corporate data. (Source: BPMF)
64.
30 % of all
mobile devices get lost every year. (Source: SANS-Institut)
65.
2/3 of all
German companies have experiences with lost smartphones. (Source: Impulse Oct. 2010)
66.
Each device that
can not be retrieved causes costs of $ 2,500 because of the lost data. (Source: Gartner)
67.
Companies with more
than 5,000 employees could save up to $ 500,000 per year by tracking their devices. (Source: Gartner)
68.
69.
„ What Mobile
Threats Are You Concerned With on Employees Smartphones?“
70.
71.
Unternehmens-Policy
72.
73.
Verschlüsselung
74.
Security für Smartphones
nutzen
75.
76.
Functions Operating System:
Anti Theft + + + (+) Anti Virus + + - (+) Encryption + + - (-) Anti Spam + + + (+) Privacy Protection + + + (+)
77.
78.
79.
Remote roll out
„over the air“ via management tool (own or third party provider) is possible
80.
81.
82.
SIM Watch:
Even if the thief changes the SIM card – all the remote functionality remains intact and the new phone number is sent to the real owner
83.
Encryption: Files,
folders and memory cards can be encrypted and access to them can be protected by password
84.
Anti Virus:
Real time protection, on-demand and scheduled scans, automatic „over the air“ anti virus data base updates
85.
Anti Spam
for calls & SMS: Unwanted calls and messages can easily be filtered out
86.
Privacy Protection:
For hiding communication histories with particular contacts, including contact book entries, call logs and SMS
87.
Remote Administration:
Smooth roll out to multiple devices without user involvement or disturbance
88.
Questions ? Jens
Fell 8Soft GmbH Phone : +49 931/250993-22 Email : [email_address] Visit our booth at Zarafa SummerCamp!
Baixar agora