iTnews

Trend Micro releases Mobile Security 5.0

By Lilia Guan, CRN on Nov 8, 2007 1:14PM
Trend Micro releases Mobile Security 5.0

Trend Micro believes as businesses dispatch workers outside the corporate structure, and move them through a variety of wireless networks, the need to ensure data needs to be protected not only from viruses and worms, but also theft or accidental loss.

According to Trend the release of Trend Micro Mobile Security (TMMS) 5.0, girded with data encryption and authentication, mitigates mobile security challenges such as security breaches and data leakage while allowing enterprise administrators to manage security for handheld devices from a single console.

Adam Biviano premium services manager at Trend Micro Australia believes as mobile devices grow in functionality, so too does the quantity and importance of the information they hold. Corporate data and key business functionality is now being entrusted to these devices and thus they become an ever increasing target.

“The temptation to steal private information cannot be ignored, whether it is personal details for later using in identity fraud attacks or corporate data which could be used to gain a competitive edge,” he said.

TMMS 5.0 features data encryption and authentication capabilities; if a mobile device is lost or stolen, the business-critical data contained in it is encrypted unless it is unlocked with a password. Data on devices that do not comply with policies can be wiped out by administrators.

The anti-malware features block viruses, worms, Trojans and SMS text message spam. Built-in firewall and Intrusion Detection System (IDS) protects against hackers, intrusions and denial-of-service attacks – all potential threats to mobile devices, said Biviano.

TMMS 5.0 uses the OfficeScan™ Client/Server Edition (OSCE) 8.0 console which also manages medium business and enterprise PC and server security. By installing TMMS 5.0 onto their OSCE 8.0 console, existing customers use a single console to manage mobile devices, desktop PCs and enterprise servers. Customers not presently using OSCE 8.0 receive an OSCE 8.0 console license with their TMMS 5.0 purchase.

Trend Micro Mobile Security 5.0 supports multiple leading platforms such as Windows Mobile™ 5.0 (Smartphone) Windows Mobile 6.0 (Standard Edition); Windows Mobile 5.0 (PocketPC) Windows Mobile 6.0 (Classic and Professional); and Symbian S60/3rd Edition (Nokia E-Series.)

Biviano said with the increase in the number of mobile workers resellers should not wait until a client comes to them with a data loss horror story before taking the time to learn about this segment of the industry.

With this product Biviano told iTnews that end-users would stand to gain from the fact that their phone or PDA device is more secure as the devices are relied upon to store personal information, photos, emails, financial information – all of which is a target to criminals.

“Similar complexities of computing security need be applied to that of mobile device security, combined with the portability. Let’s face it, no one wants to find that a criminal has been secretly using their expensive mobile internet connection to send spam or download date when they see their huge phone bill,” he said.

Pricing for Trend Micro Mobile Security 5.0 Standard includes antivirus, firewall, Intrusion Detection System, and centralised management. Trend Micro Mobile Security 5.0 Advanced adds encryption and authentication starts at $32.81 ex GST per device while TMMS 5.0 Advanced starts at $65.63 per device with standard volume discounts applying.

TMMS 5.0 Standard and Advanced for Windows Mobile™ 5.0/6.0, and TMMS 5.0 for Symbian/S60 3rd Edition (Nokia E-Series) will be available in mid-December 2007.

However TMMS 5.0 Advanced for Symbian/S60 3rd Edition, which includes encryption and authentication, is planned to be available in the first half of 2008.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
50 micro mobile releases security trend

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Lilia Guan, CRN
Nov 8 2007
1:14PM
0 Comments

Related Articles

  • Reserve Bank of NZ governor apologises for 'serious' data breach
  • Google unravels state-of-art Android and Windows exploit chains
  • Mimecast says hackers hijacked its products
  • EU drugs regulator says some data from cyber attack leaked online
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.