Company News: Page (1) of 1 - 02/01/13

Mobile World Congress 2013: G Data introduces smartphone protection and MobileManagement

February 01, 2013 --
DMN Newswire--2013-2-1--

Bochum (Germany), 1 February 2013 - This year, G Data is represented at the Mobile World Congress in Barcelona for the first time. From 25 to 27 February 2013 the IT security expert will present its current mobile security portfolio in hall 6, booth 6E20. The German provider will illustrate how companies can effectively protect smartphones and tablets, how they can effectively implement MobileManagement thanks to G Data Business solutions and how to make sure Bring Your Own Device is under control. In addition to its security solutions, G Data provides information about emerging threat scenarios for smartphone and tablet users and explains how cars could soon be targeted by eCrime.

Bring Your Own Device and MobileManagement under control
To ensure that the integration of mobile end devices, also referred to as "Bring Your Own Device", does not quickly turn into a company-wide disaster, G Data security solutions take into account the complex requirements of heterogeneous networks and protect valuable IT infrastructure. Using the incorporated MobileManagement, administrators can monitor the security status of integrated smartphones and tablet PCs at any time and can intervene directly if necessary. However, G Data's Business Generation 12 with its mobile-based admin offers even more: the web interface lets you make settings from anywhere, irrespective of what device you are using, even on a smartphone.

MWC Logo
MWC Logo

These technologies are included in G Data AntiVirus, G Data ClientSecurity and G Data EndpointProtection.


MobileManagement: keeping an eye on mobile devices
These days, many companies and their employees consider mobile devices like smartphones part of the basic equipment. Many companies also have a "Bring Your Own Device" policy. This makes it very difficult for administrators to keep track of the number of devices in the network and protect them against malware programs and other online threats. The new MobileManagement now gives administrators a clear overview of all Android devices and enables them to view their security status as well as any viruses detected. All security modules like virus protection, firewall and AntiSpam are client-based, and thus offer fully transparent protection of all end devices and run quietly in the background.

Administration: Anytime and any place
The new remote control allows administrators to access their network solution at any time and from any place, for example, to query the security status, configure the firewall, initiate scans or manage user authorisations.

All-round protection for Android smartphones and tablets
G Data MobileSecurity 2 protects mobile devices against malware, dangerous apps and threats encountered while surfing the Internet. In addition, the smart security solution helps you find lost smartphones or delete their contents from afar to protect them against unauthorised access. The password protection for applications provides additional security as well as the option to separately protect important contacts.

G Data security issues at the Mobile World Congress

"Android is everywhere"
In the future, attacks will no longer be restricted to smartphones and tablet PCs. The integration of Android in cars, smart TVs and appliances creates new attack vectors.

Threats in 2013
How have the threats posed by cyber criminals and malware developed over the last 12 months? What can users expect in the future?

The smartphone as a Trojan horse
The next round of attacks has started for industrial facilities and companies. Security expert Eddy Willems explains how smartphones open company doors to malware authors and spies.

Cyber war not on the horizon
Eddy Willems explains his view on Stuxnet, Flame, Red October and the like.

In his position as Global Security Officer and Security Evangelist at G Data Security Labs, Eddy Willems acts as the interface between technical complexity and users. He is responsible for G Data Security Labs' clear communication with the security sector, the press, retailers, resellers and consumers, and he often speaks at international conferences such as Virus Bulletin, EICAR, InfoSecurity, AVAR, RSA etc. Eddy Willems is available for interviews at the congress. Please make an appointment to speak to him.

Page: 1
Related Keywords:gdata g data

Source:Digital Media Online. All Rights Reserved

DMO TEXT LINKS
(Click here to place a textlink on this site)

Get 10 days of free unlimited access to lynda.com.
What do you want to learn today? Online video tutorials to help you learn software, creative, and business skills.
Click Here!


voice recorder
WS-801 2GB Digital Voice Recorder (2 GB Flash Memory - LCD - Portable)
By Olympus, start from $ 39.00
LS-14 4GB Digital Voice Recorder (4 GB Flash Memory - 1.8" LCD - Portable)
By Olympus, start from $ 199.00
DM-620 4GB Digital Voice Recorder (4 GB Flash Memory - LCD - Portable)
By Olympus, start from $ 149.99
With 1 Reviews.
AS-2400 Transcription Kit
By Olympus, start from $ 199.99
DS-7000IT Digital Voice Recorder NO Software
By Olympus, start from $ 599.99
DS-7000 Digital Voice Recorder
By Olympus, start from $ 599.99
---


@ Copyright, 2014 Digital Media Online, All Rights Reserved