Risk
6/24/2008
05:47 PM
Connect Directly
RSS
E-Mail
50%
50%

Sybase Adds To Mobile Security Line

Sybase iAnywhere has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

As more businesses adopt smartphones, mobile security is a growing concern. But data encryption and remote wiping may not be enough to protect a company.

"The tremendous growth in adoption of converged mobile devices occurring among business professionals will inevitably bring with it a rise in the number of attacks and in the sophistication of viruses and other malware specifically targeting these devices," said Sean Ryan, research analyst at IDC, in a statement.

To address the growing concern, Sybase iAnywhere announced Monday it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

There are already more than 500 identified viruses that target business mobile phones, according to Terry Stepian, president of Sybase iAnywhere. That figure is expected to increase dramatically as smartphones proliferate, and these viruses could potentially lead to nightmare scenarios of corporate data theft or billing fiascos if a device gets a dialer Trojan.

The company's Afaria mobile security line already provides features like device authentication and data encryption, but the latest additions should help businesses stay ahead of the hackers, Stepian said.

The antivirus is the first mobile security product of its kind that utilizes heuristic technology to analyze incoming files based on their behavior, the company said. This technology is widely used in desktop products to discover viruses and malware.

The antivirus also features automatic signature file updates to get up to date protection, and it has real-time scanning of any file the mobile phone receives.

Afaria's firewall manager lets IT administrators filter inbound and outbound communication on the device by using black lists and white lists. Additionally, administrators can minimize mobile spam by establishing customized black lists to block SMS, MMS, or incoming calls. The end user can also add to the blacklist with the push of a button, Stepian said.

These products have been specifically developed for mobile devices, with the express goal of not draining computing power or battery life, according to Stepian.

The mobile security suite supports a broad range of mobile operating systems including BlackBerry, Windows Mobile, Symbian, and more. The new Afaria antivirus and firewall protection capabilities will be available by July 1.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.