2. "For many professionals, the mobile
phone has become a mobile office,“
- Mike Jones, Symantec
"There is no question that mobile security
will eventually equal – if not surpass – PC
security as a threat to IT departments,"
- Denise Culver, Heavy Reading Mobile Networks Insider
“Internal attacks are one of the biggest
threats facing your data and systems,”
-Cortney Thompson, CTO of Green House Data
“According to a BT study, mobile
security breaches have affected more
than two-thirds (68 %) of global
organizations in the last 12 months.”
“Implement mobile security solutions that protect both
corporate data and access to corporate systems while
also respecting user’s privacy through containerization,”
- Nicko van Someren, CTO, Good Technology
3. • People store much personal info on them: email, calendars,
contacts, pictures, etc.
• Sensitive organizational information.
• Can fit in pockets, easily lost/stolen.
• Built-in billing system: SMS/MMS (mobile operator), in-app
purchases (credit card), etc.
• Many new devices have near field communications (NFC), used
for contactless payments, etc.
• Your device becomes your credit card
• Location privacy issues
4. With the explosive growth of smartphones, tablets and mobile
devices, companies must find a means of providing access to their
internal systems,information to their mobile workforce securely and
seamlessly along with securing highly sensitive and important data
from stealing.Not only that it’s a high time that we secure devices
from physical damages and theft.
6. • DATA STORED IN MOBILE.
• DEVICE FROM PHYSICAL DAMAGE/THEFT.
• CONTACTS
• MESSAGES
• MAILS
• USERNAME/PASSWORDS
• MEDIA FILES(PICTURES,VIDEOS etc.)
• DOCUMENTS(TEXT FILES,PDFs,PPTs)
• NOTES/REMINDERS.
• VOICE RECORDINGS.
• IMP. DATAS INSIDE APPS.etc.
WHY
PROTECT?
PRIVACY
7. HERE’S WHAT WE WANT
TO OFFER:
• MALWARE PROTECTION.
• IDENTITY THEFT PROTECTION.
• ENCRYPTION OF DATA.
• FREE CLOUD STORAGE FOR DATA BACK UP.
• INSURANCE OF DEVICE.
• HASSLE FREE CLAIMS!!
8. Do you have
a smart
phone?
Does it
contain
data?
Does it
contain
photos and
videos?
Do you keep
important
business
information?
Do you use
internet for
monetary
transactions?
9. • The attacker can manipulate the smart phone as a zombie machine.
• The attacker can easily force the smart phone to make phone calls.
• A compromised smart phone can record conversations between the user and
others and send them to a third party calls.
• An attacker can also steal a user's identity, usurp their identity and thus
impersonate the owner.
• The attacker can reduce the utility of the smart phone, by discharging the battery.
• The attacker can prevent the operation and/or starting of the smart phone by
making it unusable.
• The attacker can remove the personal (photos, music, videos, etc.) or professional
data (contacts, calendars, notes) of the user
12. •Free up space (for more of the apps & media you love)-
Safely remove hidden clutter, unused apps, calling history, your
largest files, & more to free up space for even more of the apps,
photos, & music you love most.
•Control what you share (across all major social networks)-
Our product takes you straight to your privacy settings to give you
the pros & cons of each one. From there, you can easily turn any of
them on or off with just a click.
13. •Scan device
Offers multiple scanning options such as Full Scan, Scan All
Apps, Scan Selected Apps, Scan Memory Card and Scan
Selected Folders.
• Security Advisor:
The Security Advisor guides you about settings that can
enhance the overall security of your Smartphone. For
example, if the 'Screen Lock' setting is not enabled on your
phone, then the Security Advisor will instruct you to
enable it.
14. • Set Privacy-The Set Privacy feature allows you to protect your
privacy with the following functionalities,
1. Call & Message Filter:
With this feature you can easily block incoming calls and SMSs from
unknown or unwanted numbers. And now, you can also use this
feature to block all numbers within a particular series.
2. International Call Block:
This feature allows you to block unknown International calls.
16. -As,we already talked about mobile threat and attack .Their exist
another problem device loss and theft.We will just give you a small
statistics about mobile device loss and theft.
-Many mobile devices lost, stolen each year
200 mobile phones lost/stolen every minute in the INDIA .
56% of us misplace our mobile phone or laptop each
month .
17. Cell phone owner/users who can insure their mobile telephone
instrument from loss and/or damages under this policy.
The policy for mobile phones provides cover against:
• Fire.
• Riot, strike, malicious damage and terrorist activities.
• Theft.
• Accident.
• Fortuitous circumstances.
18. Exclusions under the mobile phone insurance policy are-
• Mysterious disappearance.
• Theft from unattended vehicles, except from fully enclosed car that is
securely locked.
• Theft, loss or damage during the hire or loan to a third party.
• Mechanical and electronic breakdown or derangement.
• Overloading and experimentation involving imposition of any abnormal
conditions.
• Damage by wear and tear, vermin, atmospheric or climatic condition or
gradual deterioration, inherent defect or from any process of cleaning,
repairing or maintenance.
• Loss or damage due to war or nuclear perils, loss by water or from any
water borne craft.
• Intentional or willful act of the insured party.
19. The insurance cover provides compensation equivalent
to the the cost of replacement of the instrument by a
new instrument of the same specification and same
capacity, including all taxes and duties.
20. • WHAT WE ARE PROVIDING
INSURANCE
FOR THEFT
MOBILE
DATA
SECURITY
INSURANCE
FOR
DAMAGE
22. Hand set /tablet
price(INR.)
MARKET PRICE
OF OTHER
INSURANCE(INR
) /ANNUM
MOBISHIELD
price(INR.)/
ANNUM
Total
price(MOBISHIELD
APP
+Insurance)(INR.)/AN
NUM
4000-9999 599 300 700
10,000-14,999 799 450 850
15,000-24,999 1299 800 1200
*Terms and conditions apply