Kaspersky Endpoint Security 8 for Smartphone now supports Android

June 2011 Information Security, Products & Solutions

Kaspersky Lab has announced the release of Maintenance Pack 1 for Kaspersky Endpoint Security 8 for Smartphone. This update introduces support for the Android platform as well as new versions of the Symbian and BlackBerry mobile operating systems.

Kaspersky Endpoint Security 8 for Smartphone incorporates all the necessary components to guarantee reliable protection for mobile devices, including: antivirus and anti-theft modules, protection for personal data and the ability to block unwanted calls and SMSs. In addition to providing malware protection, Kaspersky Endpoint Security 8 for Smartphone keeps corporate data safe even if a smartphone is lost or stolen. It can also helps to locate a lost smartphone using the device’s internal GPS receiver and can inform the owner of the new number if the SIM card is changed.

Says Sergey Nevstruev, head of the Mobile Solutions Business Department, Kaspersky Lab; “The Android platform saw tremendous growth in 2010 and became the leader in early 2011. With Maintenance Pack 1, Kaspersky Endpoint Security 8 for Smartphone allows Android and other mobile devices to be integrated into corporate infrastructures. As a result, our solutions ensure corporate data security and protect against threats on the four most popular mobile platforms, a fact that is sure to be appreciated by our corporate clients”.

Every day, more people are making active use of their smartphones for work, which offers a new level of convenience, but also introduces new threats to sensitive data. The first effective virus for smartphones appeared in 2004. Worm.SymbOS.Cabir used Bluetooth for attacking other Symbian-based phones, and back then the advice from analysts to turn off Bluetooth when not needed sounded reasonable enough. Nowadays though, that advice is no longer suitable as smartphones have more ways to connect to the Internet and other devices than most desktop PCs. In 2011, the number of malicious programs for mobile phones detected by Kaspersky Lab exceeded 500.

A large number of these target ordinary phones via the ubiquitous J2ME platform. The cybercriminals have their sights firmly set on users’ money and personal data which they try to obtain via SMS and premium rate number scams, and some may even have the capability to intercept mobile banking verification data.

Malware is not the only way to compromise corporate data on mobiles. In a forecast for 2011 by IDC, they noted that lost or stolen smartphones, application vulnerabilities and device support in corporate infrastructure will become an even bigger problem for companies. According to IDC’s forecast, “Mobile device support is a growing issue as more corporate employees buy their own laptops, smartphones and other devices and request corporate access to networks, data and applications”. So, if an unprotected smartphone is stolen, a criminal may not only gain access to sensitive data on the device itself, but to the whole corporate infrastructure as well. A simple analysis of a corporate calendar, which is often automatically synchronised with an employee’s mobile phone, can reveal more than you might expect. A phone book with sensitive business information can reveal even more.

A further problem for mobile phones in general is unwanted calls and SMSs. As well as spam, these two issues distract device owners and waste their time - and unsolicited SMSs may even contain links to malware or other threats.

New features and improvements in Kaspersky Endpoint Security 8 for Smartphone include:

* Full protection for Android-based devices, including virus protection, anti-theft, protection of sensitive data and blocking of unwanted calls and SMSs.

* Other new operating systems, popular in the corporate world, are also supported. Maintenance Pack 1 introduces support for Symbian 3 and BlackBerry 6.0. Previous versions of BlackBerry (4.5-5.0) and Symbian (S60 9.1-9.4 for Nokia models) operating systems are also supported, as well as Windows Mobile (5.0-6.5).

* Kaspersky Endpoint Security 8 for Smartphone includes features to keep sensitive data confidential, including the communication histories of important contacts.

* Android devices can be centrally managed via the Kaspersky Administration Kit, which enables rules and policies to be set that are in accordance with employees’ activities.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Water mist for optimal fire suppression
Fire & Instrument Services Fire & Safety Products & Solutions
Building owners, facility managers and other professionals are seeking fire suppression solutions that can meet the demands of modern buildings and facilities, including reduced water usage and environmental impact, while providing the necessary protection for assets and business operations.

Read more...
Smoke 'em out
Fire & Safety Products & Solutions
The moment an intrusion is detected, Smoke Screen’s high-powered fog cannons activate, flooding the area with a dense, harmless fog that reduces visibility to near zero within seconds.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
IoT innovation in water mist fire protection
Fire & Safety Products & Solutions IoT & Automation
Marioff, a provider of water mist fire protection, has introduced an Internet of Things (IoT) solution designed for high-pressure water mist systems, enabling real-time monitoring, smart alerts, and centralised control.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.