05:47 PM

Sybase Adds To Mobile Security Line

Sybase iAnywhere has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

As more businesses adopt smartphones, mobile security is a growing concern. But data encryption and remote wiping may not be enough to protect a company.

"The tremendous growth in adoption of converged mobile devices occurring among business professionals will inevitably bring with it a rise in the number of attacks and in the sophistication of viruses and other malware specifically targeting these devices," said Sean Ryan, research analyst at IDC, in a statement.

To address the growing concern, Sybase iAnywhere announced Monday it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

There are already more than 500 identified viruses that target business mobile phones, according to Terry Stepian, president of Sybase iAnywhere. That figure is expected to increase dramatically as smartphones proliferate, and these viruses could potentially lead to nightmare scenarios of corporate data theft or billing fiascos if a device gets a dialer Trojan.

The company's Afaria mobile security line already provides features like device authentication and data encryption, but the latest additions should help businesses stay ahead of the hackers, Stepian said.

The antivirus is the first mobile security product of its kind that utilizes heuristic technology to analyze incoming files based on their behavior, the company said. This technology is widely used in desktop products to discover viruses and malware.

The antivirus also features automatic signature file updates to get up to date protection, and it has real-time scanning of any file the mobile phone receives.

Afaria's firewall manager lets IT administrators filter inbound and outbound communication on the device by using black lists and white lists. Additionally, administrators can minimize mobile spam by establishing customized black lists to block SMS, MMS, or incoming calls. The end user can also add to the blacklist with the push of a button, Stepian said.

These products have been specifically developed for mobile devices, with the express goal of not draining computing power or battery life, according to Stepian.

The mobile security suite supports a broad range of mobile operating systems including BlackBerry, Windows Mobile, Symbian, and more. The new Afaria antivirus and firewall protection capabilities will be available by July 1.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.