SlideShare a Scribd company logo
1 of 2
Download to read offline
BUSINESS EDITION

www.eset.lu
ESET Mobile Security Business Edition

Anti-Theft Features
WHAT IT DOES
Remote Wipe

SIM Matching

Lets you stay in control of your phone remotely, even when an unauthorized SIM card was inserted into
your device. Trusted Friend will receive a wealth of information about the inserted SIM, including the phone
number, IMSI and IMEI codes.

Trusted Friend

Trusted Friend is your help in the event of mobile phone’s loss or theft. Initially, you set up one or more
Trusted Friend phone numbers.

SMS/MMS Antispam

System Requirements :
Windows Mobile 5.0; 6.0; 6.1; 6.5;
Symbian S60 3rd Edition, Feature Pack 1 or 2; 5th Edition;
Symbian^3 (Nokia only)

Safely deletes all contacts, messages and data on removable memory cards with a remote SMS command.
Advanced cleaning procedures ensure that it is not be possible to restore wiped data.

Filters out unwanted SMS/MMS messages. Allows you to define your own trustworthy contacts via
blacklist/whitelist or simply block all unknown numbers.

Security Features
WHAT IT DOES
Real-time Protection

Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for
mobile platforms.

Security Audit

An on-demand security audit checks the status of all vital phone functions, including battery level,
Bluetooth status, device visibility, disk space and running processes.

On-access Scanning

Advanced scanning protects your device from threats attempting to access the system via Bluetooth, Wi-Fi
or Infrared.

On-demand Scanning

On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable
media. Scanning of specific folders is also supported.

Firewall

Monitors all incoming and outgoing communication based on custom rules. Gives the option to
automatically block data while in roaming to keep your phone bill under control.

Remote Administration

Enables you to check the security status of your smartphone fleet, run on-demand scans and get overview
and helpful information to keep you up-to-date on your smartphones’ security.

Exclusive distributor Benelux
Copyright © 1992 – 2012 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense,
ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered
trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be
registered trademarks of its proprietors. Produced according to quality standards of
ISO 9001:2000.

Visit us on Facebook
www.facebook.com/ESETNOD32Belux

pioneer of the antivirus industry for 25 years

More Related Content

What's hot

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureBlackBerry
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodesTran Thanh
 
SecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data SheetSecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data SheetBlackBerry
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity OnlineJon Loyd
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseItai Bass
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security ITSTEFFI_MEDINA
 

What's hot (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Bank security
Bank securityBank security
Bank security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise Brochure
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodes
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
SecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data SheetSecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data Sheet
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security
Mobile securityMobile security
Mobile security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
CONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customersCONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customers
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 

Similar to ESET Mobile Security Business Edition Anti-Theft Features

Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1Ashutosh Pandey
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915Tom Malatesta
 
Silentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PageSilentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PagePeter Doh
 
FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015Tom Malatesta
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy PhonesJohn Adam
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Mobile security apps (1)
Mobile security apps (1)Mobile security apps (1)
Mobile security apps (1)Haniel Zadok
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile SlidesRegan McCarthy
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 

Similar to ESET Mobile Security Business Edition Anti-Theft Features (20)

Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1Max secure mobile tab_security_ value prop - 1
Max secure mobile tab_security_ value prop - 1
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915
 
Silentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PageSilentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1Page
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Mobile security apps (1)
Mobile security apps (1)Mobile security apps (1)
Mobile security apps (1)
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEETESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 

ESET Mobile Security Business Edition Anti-Theft Features

  • 2. ESET Mobile Security Business Edition Anti-Theft Features WHAT IT DOES Remote Wipe SIM Matching Lets you stay in control of your phone remotely, even when an unauthorized SIM card was inserted into your device. Trusted Friend will receive a wealth of information about the inserted SIM, including the phone number, IMSI and IMEI codes. Trusted Friend Trusted Friend is your help in the event of mobile phone’s loss or theft. Initially, you set up one or more Trusted Friend phone numbers. SMS/MMS Antispam System Requirements : Windows Mobile 5.0; 6.0; 6.1; 6.5; Symbian S60 3rd Edition, Feature Pack 1 or 2; 5th Edition; Symbian^3 (Nokia only) Safely deletes all contacts, messages and data on removable memory cards with a remote SMS command. Advanced cleaning procedures ensure that it is not be possible to restore wiped data. Filters out unwanted SMS/MMS messages. Allows you to define your own trustworthy contacts via blacklist/whitelist or simply block all unknown numbers. Security Features WHAT IT DOES Real-time Protection Protects all applications, files and memory cards with the ESET NOD32 proactive technology optimized for mobile platforms. Security Audit An on-demand security audit checks the status of all vital phone functions, including battery level, Bluetooth status, device visibility, disk space and running processes. On-access Scanning Advanced scanning protects your device from threats attempting to access the system via Bluetooth, Wi-Fi or Infrared. On-demand Scanning On-demand Scanning provides reliable scanning and cleaning of integrated memory and exchangeable media. Scanning of specific folders is also supported. Firewall Monitors all incoming and outgoing communication based on custom rules. Gives the option to automatically block data while in roaming to keep your phone bill under control. Remote Administration Enables you to check the security status of your smartphone fleet, run on-demand scans and get overview and helpful information to keep you up-to-date on your smartphones’ security. Exclusive distributor Benelux Copyright © 1992 – 2012 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2000. Visit us on Facebook www.facebook.com/ESETNOD32Belux pioneer of the antivirus industry for 25 years