Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/21/2011
12:09 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ESET Releases ESET Mobile Security Business Edition Beta

Solution can be managed remotely via ESET Remote Administrator 4

London, UK – ESET, the leader in proactive threat protection announces the release of ESET Mobile Security Business Edition BETA for public testing. Built for Smartphones and Pocket-PCs running Windows Mobile and Symbian operating systems, it delivers unparalleled data security and protection against emerging threats. The Business Edition of ESET Mobile Security shares all functionalities with the current ESET Mobile Security, while adding functionality to be managed remotely via ESET Remote Administrator 4.

The BETA version of ESET Mobile Security Business Edition version is available in the following localised languages: English, Czech, Slovak, German, Spanish, French, Turkish, Polish, Russian, Chinese Traditional and Chinese Simplified.

ESET Mobile Security Business Edition BETA is available for download on this link: http://www.eset.eu/download/beta

ESET Mobile Security Business Edition Key Features:

Remote Administration Support — ESET Mobile Security Business Edition can be managed via ESET Remote Administrator 4. This brings a lot of advantages especially in a business environment, where administrators can now send and receive the configuration from the mobile client, perform On-Access or On-Demand Scans, conduct a Security Audit, adjust Firewall settings and Spam Filter logs or schedule connection intervals according to preference. In addition, the admins can gather and change the configuration of the mobile client, send a message via ERA 4 Console and update the virus database remotely if needed.

Anti-Theft — Prevents unauthorised access to your data in case of device loss or theft.

Remote Wipe — Deletes all sensitive data using a simple SMS command (contacts, messages and removable memory media) in case of emergency,

SIM Matching — Allows specified SIM cards to receive notification in case of an unauthorised SIM insertion, including the card’s telephone number, IMSI and IMEI.

Password Protection — Safeguards mobile devices against unauthorised uninstall or modifications of security software

Security Audit — Tells the user in a convenient and easy way, what is the current security status of the device – whether there is a potential security risk.

SMS and MMS Antispam — Allows user to define trustworthy contacts via customisable black or whitelist or simply block unknown numbers.

Firewall — Monitors all incoming and outgoing communications based on custom rules.

Additionaly, ESET Mobile Security brings the following benefits to users on the go:

Proactive Detection — The optimised heuristics of the ESET scanning engine ensures protection from current and emerging threats.

Quarantine — An option either to delete threats right away or isolate them, with the Restore feature.

Broad Scanning Options — Scanning and cleaning of the device’s integral memory as well as removable memory cards. It is also possible to check memory running processes. All files incoming or leaving via wireless connections are scanned for infiltrations.

Automatic Virus Database Updates — Provides protection against most recent mobile security threats. The user can schedule the delivery of updates on a daily, weekly, or monthly basis.

More information about the product can be found at http://www.eset.eu/products

About ESET

Founded in 1992, ESET is a global provider of security solutions for the home and business segment. The industry leader in proactive malware detection, ESET NOD32 Antivirus holds the world record for the number of Virus Bulletin "VB100 Awards," never to have missed a single “In-the-Wild” worm or virus since the inception of testing in 1998.

ESET has headquarters in Bratislava, Slovakia and offices in San Diego, USA; Buenos Aires, Argentina; Prague, Czech Republic, and an extensive partner network in 180 countries. In 2008, ESET has opened a new research center in Krakow, Poland. ESET was named by Deloitte’s Technology Fast 500 as one of the fastest-growing technology companies in the region of Europe, Middle East and Africa.

Media contact:

Lucy Harvey

Harvard PR

phone.: 0207 861 2504

e-mail: [email protected]

web: www.eset.co.uk

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10694
PUBLISHED: 2019-12-12
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1....
CVE-2019-10695
PUBLISHED: 2019-12-12
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user�s username and password were exposed in the job�s Job Details pane in the PE console. These issues have been resolved in version 1.2.1 of the ...
CVE-2019-5085
PUBLISHED: 2019-12-12
An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.
CVE-2019-5090
PUBLISHED: 2019-12-12
An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulner...
CVE-2019-5091
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.