Risk
6/24/2008
05:47 PM
Connect Directly
RSS
E-Mail
50%
50%

Sybase Adds To Mobile Security Line

Sybase iAnywhere has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

As more businesses adopt smartphones, mobile security is a growing concern. But data encryption and remote wiping may not be enough to protect a company.

"The tremendous growth in adoption of converged mobile devices occurring among business professionals will inevitably bring with it a rise in the number of attacks and in the sophistication of viruses and other malware specifically targeting these devices," said Sean Ryan, research analyst at IDC, in a statement.

To address the growing concern, Sybase iAnywhere announced Monday it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

There are already more than 500 identified viruses that target business mobile phones, according to Terry Stepian, president of Sybase iAnywhere. That figure is expected to increase dramatically as smartphones proliferate, and these viruses could potentially lead to nightmare scenarios of corporate data theft or billing fiascos if a device gets a dialer Trojan.

The company's Afaria mobile security line already provides features like device authentication and data encryption, but the latest additions should help businesses stay ahead of the hackers, Stepian said.

The antivirus is the first mobile security product of its kind that utilizes heuristic technology to analyze incoming files based on their behavior, the company said. This technology is widely used in desktop products to discover viruses and malware.

The antivirus also features automatic signature file updates to get up to date protection, and it has real-time scanning of any file the mobile phone receives.

Afaria's firewall manager lets IT administrators filter inbound and outbound communication on the device by using black lists and white lists. Additionally, administrators can minimize mobile spam by establishing customized black lists to block SMS, MMS, or incoming calls. The end user can also add to the blacklist with the push of a button, Stepian said.

These products have been specifically developed for mobile devices, with the express goal of not draining computing power or battery life, according to Stepian.

The mobile security suite supports a broad range of mobile operating systems including BlackBerry, Windows Mobile, Symbian, and more. The new Afaria antivirus and firewall protection capabilities will be available by July 1.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.