Risk
6/24/2008
05:47 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Sybase Adds To Mobile Security Line

Sybase iAnywhere has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

As more businesses adopt smartphones, mobile security is a growing concern. But data encryption and remote wiping may not be enough to protect a company.

"The tremendous growth in adoption of converged mobile devices occurring among business professionals will inevitably bring with it a rise in the number of attacks and in the sophistication of viruses and other malware specifically targeting these devices," said Sean Ryan, research analyst at IDC, in a statement.

To address the growing concern, Sybase iAnywhere announced Monday it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

There are already more than 500 identified viruses that target business mobile phones, according to Terry Stepian, president of Sybase iAnywhere. That figure is expected to increase dramatically as smartphones proliferate, and these viruses could potentially lead to nightmare scenarios of corporate data theft or billing fiascos if a device gets a dialer Trojan.

The company's Afaria mobile security line already provides features like device authentication and data encryption, but the latest additions should help businesses stay ahead of the hackers, Stepian said.

The antivirus is the first mobile security product of its kind that utilizes heuristic technology to analyze incoming files based on their behavior, the company said. This technology is widely used in desktop products to discover viruses and malware.

The antivirus also features automatic signature file updates to get up to date protection, and it has real-time scanning of any file the mobile phone receives.

Afaria's firewall manager lets IT administrators filter inbound and outbound communication on the device by using black lists and white lists. Additionally, administrators can minimize mobile spam by establishing customized black lists to block SMS, MMS, or incoming calls. The end user can also add to the blacklist with the push of a button, Stepian said.

These products have been specifically developed for mobile devices, with the express goal of not draining computing power or battery life, according to Stepian.

The mobile security suite supports a broad range of mobile operating systems including BlackBerry, Windows Mobile, Symbian, and more. The new Afaria antivirus and firewall protection capabilities will be available by July 1.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web