SlideShare ist ein Scribd-Unternehmen logo
1 von 29
www.escanav.com
eScan Android Security
Ver: 1.1AP (030513)
www.escanav.comwww.escanav.com
Agenda
• What is eScan Mobile and Tablet Security
• Customization
• Business Models for Mobile Operators
www.escanav.comwww.escanav.com
Device Theft or Loss
1
Malwares and other threats
2
4
3
Unwanted Calls & SMS Filtering
5
Parental and unwanted application control for teenagers
Rogue Applications from market
2
Challenges
www.escanav.comwww.escanav.com
eScan Mobile and Tablet Security Features
www.escanav.com
Comparison
Features eScan Mobile Security eScan Tablet Security
Anti-Virus Yes Yes
Scheduled Updates Yes Yes
Call & SMS Filter Yes No
Backup and Restore Yes No
Parental & Application Control Yes Yes
Privacy Control Yes Yes
Anti-Theft Yes Yes
Notifications Yes Yes
Password Control Yes Yes
* Android logo is taken from wallpaperswide.com
www.escanav.com
Anti-Theft Features
• Locate your device, if it is lost or stolen.
• Remotely Block or Wipe your Device
• Maintain access to your device, even if its
SIM card is replaced
• Maintain remote access to your device
even if device does not support SIM card
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
If your device is lost or stolen…
1. Send an SMS from any second device to
your lost device number (lock:SecretCode)
2. Once the SMS is received – your lost device
is blocked !
… or the content is wiped if you’ve sent a
wipe command.
Anti-Theft : Block and Wipe
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : Locate via GPS
To locate your lost device…
1. Send an SMS from any second device
to your lost device number
2. Get a mapped location of your lost
device in your email!*
* the information is sent only when a
valid GPS connection is established
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : SIM Watch
Changing the SIM card in your device is the very first
thing a thief will do, in order to remain untraceable.
1. eScan Mobile Security is designed to autolock
when a new SIM is detected
2. The new number is secretly reported to you via
SMS and email
3. You then have a new number to Block, Wipe and
Locate remotely!
… or you can choose to report this number
to the police.
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : Scream
With eScan’s Scream feature you can make your device expel
an audible alarm.
1. You can rapidly find your device if you have
mislaid it somewhere.
2. The alarm can be activated via the Anti-Theft Web
Management portal or simply by sending your device a
special text message.
3. Your secret code can be used to deactivate the alarm.
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.comwww.escanav.com
What if a thief does
not replace the SIM card?
www.escanav.com
Anti-Theft : Without SIM
If SIM is not replaced or if the device does not house a SIM slot. Then what???
1. Register your device on eScan Anti-theft portal.
2. In case of device lost or stolen. Login to http://anti-theft.escanav.com with
your registered email id and password and remotely control your device.
* This feature needs an active internet connection on device
*Anti-Theft Without SMS method is available in eScan for Tablet Security
www.escanav.com
Call and SMS Filter
Block unwanted calls and SMSs from wasting
your precious time.
www.escanav.com
Call and SMS Filter
1. Received a call or a SMS from unknown
number?
2. Notification will be displayed to block or
allow the number.
3. Single-click to add this number to White List
or Black list
4. Wild card support
…e.g. you can block any number ending with 938
with following parameter %938
www.escanav.com
Parental & Application Control
Easily protect your kids from accessing
inappropriate websites & control the apps they
download.
www.escanav.com
Parental & Application Control
1. Restrict your child’s calls and SMSs.
2. Use GPS Find to locate your child in case
of an emergency.
3. Restrict unwanted applications from
executing.
4. Blocks anonymous proxy servers by
default.
5. Blocks newly installed applications by
default
www.escanav.com
Anti-Malware
Real time scanner to protect against ongoing
mobile threats
The latest mobile security technologies
protects your device from viruses, spyware
and more.
Antivirus database updates with minimal
impact on performance.
www.escanav.com
Privacy Advisor
The Privacy Advisor provides a complete list
of applications using the device permissions.
Thus allowing you to keep a check on the
security level of all installed applications.
www.escanav.com
Backup & Restore
• Backup option gives you the
advantage of backing up your
contacts and SMS that are important
to you.
• eScan mobile security also comes
with the restore option that helps
retrieve your contacts and SMSs if
your device is reverted back to it’s
default factory settings.
www.escanav.com
Auto Update
The option to update only when Wi-Fi is
available forces eScan to download
updates only when a valid Wi-Fi
connection is available.
www.escanav.com
Recover Secret Code
The eScan Mobile Security allows you to recover
your secret code in case, if you have forgotten
or lost the secret code. You need to specify a
valid e-mail ID in the registration details
because recovery of secret code is sent to your
e-mail address
www.escanav.com
Customization
eScan allows customization of its application to
all partners, wherein they can have their
company logo within eScan Mobile Security or
eScan Tablet Security.
e.g. Your logo
www.escanav.com
Customization
Once customized your company logo will be
shown within eScan Mobile Security or eScan
Tablet Security
If you want to customize the software, send in your
logo in following size:
Width - 60 pixels
Height - 47 pixels
* Android logo is taken from wallpaperswide.com
www.escanav.com
Licensing
• Licensing Period
– 1 Year
– 2 Year
– Unlimited (Lifetime / Perpetual) – 5 Year
Note: License Key is not transferable to any other device
www.escanav.com
Reports of licenses downloaded & activated
The Online portal gives a Report of the following -
o Total installation count i.e. – Total number of downloads
o Total Trial Installation Count i.e. – Total number of the
trial version downloads.
o Total Paid device count – Total number of devices that
have installed a Purchased version .
www.escanav.com
1. Mobile user will send SMS to Service
Provider for activating 3G services.
2. In return, Service Provider will send
confirmation SMS for 3G Services
activation to mobile user along with
eScan download link.
Once mobile user download and
install eScan, eScan will
automatically send SMS to Service
provider with registration
informationeScan will download virus signatures from
eScan server
1. If user sends sms to deactivate 3G services, Service
Provider will send SMS for deactivation, upon
receiving of the deactivation SMS eScan will be
deactivated.
1. If user wants to reactivate the 3G service, he will send
the SMS to SP, SP will send activation SMS to the
device, upon receiving of the SMS eScan will get
activated.
Once the registration information is
received by Service Providers ( SP ) SMS
server, SMS server will update this
information to eScan API hosted at SP, and
eScan API will update this information on SP
and eScan activation server
ISP Model ( SMS based )
* For ISP model without SMS please contact our sales team at sales@escanav.com
www.escanav.com
Reports of licenses downloaded & activated
http://db.escanav.com/mwscnew/antitheft_report.asp
www.escanav.com
eScan as a service
o Scalable
o Simple to buy
o Free trial period
o Flexible trial period: the partner can use different evaluation period
o Usual business model: Automatic revenue sharing
www.escanav.com
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
Reflexion rtc
Reflexion rtcReflexion rtc
Reflexion rtcTheArturoO
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total SecurityAbhijeet Guha
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Craig Rispin
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malwarejackadision
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesRozell Sneede
 
ADP03 - Home Security
ADP03 - Home SecurityADP03 - Home Security
ADP03 - Home SecurityChad Landman
 
ADP03 Home Security
ADP03 Home SecurityADP03 Home Security
ADP03 Home SecurityChad Landman
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationWiseKnow Thailand
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)shubh1112
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancercharliedavibrown
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionCarol Witson
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 

Was ist angesagt? (20)

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Reflexion rtc
Reflexion rtcReflexion rtc
Reflexion rtc
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total Security
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & viruses
 
ADP03 - Home Security
ADP03 - Home SecurityADP03 - Home Security
ADP03 - Home Security
 
ADP03 Home Security
ADP03 Home SecurityADP03 Home Security
ADP03 Home Security
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product Presentation
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 

Ă„hnlich wie Essential Android Security Features for Mobile Users

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?buffetporch98
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
How to hack someones cell phone call log
How to hack someones cell phone call logHow to hack someones cell phone call log
How to hack someones cell phone call logissac228
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
How to spy on texts and calls
How to spy on texts and callsHow to spy on texts and calls
How to spy on texts and callsmakayla04
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?Sphere Soc
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
How to spy calls and sms
How to spy calls and smsHow to spy calls and sms
How to spy calls and smsmakayla04
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability ScanShawn Jordan
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Amld lilly
Amld lillyAmld lilly
Amld lillyrichard116
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Krisshhna Daasaarii
 
How to spy on my boyfriends text messages
How to spy on my boyfriends text messagesHow to spy on my boyfriends text messages
How to spy on my boyfriends text messagesmakayla04
 
Mobile Miner Installation
Mobile Miner InstallationMobile Miner Installation
Mobile Miner InstallationkingsBSD
 

Ă„hnlich wie Essential Android Security Features for Mobile Users (20)

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
How to hack someones cell phone call log
How to hack someones cell phone call logHow to hack someones cell phone call log
How to hack someones cell phone call log
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
How to spy on texts and calls
How to spy on texts and callsHow to spy on texts and calls
How to spy on texts and calls
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
How to spy calls and sms
How to spy calls and smsHow to spy calls and sms
How to spy calls and sms
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Amld lilly
Amld lillyAmld lilly
Amld lilly
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
How to spy on my boyfriends text messages
How to spy on my boyfriends text messagesHow to spy on my boyfriends text messages
How to spy on my boyfriends text messages
 
Mobile Miner Installation
Mobile Miner InstallationMobile Miner Installation
Mobile Miner Installation
 

KĂĽrzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

KĂĽrzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 

Essential Android Security Features for Mobile Users

  • 2. www.escanav.comwww.escanav.com Agenda • What is eScan Mobile and Tablet Security • Customization • Business Models for Mobile Operators
  • 3. www.escanav.comwww.escanav.com Device Theft or Loss 1 Malwares and other threats 2 4 3 Unwanted Calls & SMS Filtering 5 Parental and unwanted application control for teenagers Rogue Applications from market 2 Challenges
  • 5. www.escanav.com Comparison Features eScan Mobile Security eScan Tablet Security Anti-Virus Yes Yes Scheduled Updates Yes Yes Call & SMS Filter Yes No Backup and Restore Yes No Parental & Application Control Yes Yes Privacy Control Yes Yes Anti-Theft Yes Yes Notifications Yes Yes Password Control Yes Yes * Android logo is taken from wallpaperswide.com
  • 6. www.escanav.com Anti-Theft Features • Locate your device, if it is lost or stolen. • Remotely Block or Wipe your Device • Maintain access to your device, even if its SIM card is replaced • Maintain remote access to your device even if device does not support SIM card *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 7. www.escanav.com If your device is lost or stolen… 1. Send an SMS from any second device to your lost device number (lock:SecretCode) 2. Once the SMS is received – your lost device is blocked ! … or the content is wiped if you’ve sent a wipe command. Anti-Theft : Block and Wipe *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 8. www.escanav.com Anti-Theft : Locate via GPS To locate your lost device… 1. Send an SMS from any second device to your lost device number 2. Get a mapped location of your lost device in your email!* * the information is sent only when a valid GPS connection is established *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 9. www.escanav.com Anti-Theft : SIM Watch Changing the SIM card in your device is the very first thing a thief will do, in order to remain untraceable. 1. eScan Mobile Security is designed to autolock when a new SIM is detected 2. The new number is secretly reported to you via SMS and email 3. You then have a new number to Block, Wipe and Locate remotely! … or you can choose to report this number to the police. *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 10. www.escanav.com Anti-Theft : Scream With eScan’s Scream feature you can make your device expel an audible alarm. 1. You can rapidly find your device if you have mislaid it somewhere. 2. The alarm can be activated via the Anti-Theft Web Management portal or simply by sending your device a special text message. 3. Your secret code can be used to deactivate the alarm. *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 11. www.escanav.comwww.escanav.com What if a thief does not replace the SIM card?
  • 12. www.escanav.com Anti-Theft : Without SIM If SIM is not replaced or if the device does not house a SIM slot. Then what??? 1. Register your device on eScan Anti-theft portal. 2. In case of device lost or stolen. Login to http://anti-theft.escanav.com with your registered email id and password and remotely control your device. * This feature needs an active internet connection on device *Anti-Theft Without SMS method is available in eScan for Tablet Security
  • 13. www.escanav.com Call and SMS Filter Block unwanted calls and SMSs from wasting your precious time.
  • 14. www.escanav.com Call and SMS Filter 1. Received a call or a SMS from unknown number? 2. Notification will be displayed to block or allow the number. 3. Single-click to add this number to White List or Black list 4. Wild card support …e.g. you can block any number ending with 938 with following parameter %938
  • 15. www.escanav.com Parental & Application Control Easily protect your kids from accessing inappropriate websites & control the apps they download.
  • 16. www.escanav.com Parental & Application Control 1. Restrict your child’s calls and SMSs. 2. Use GPS Find to locate your child in case of an emergency. 3. Restrict unwanted applications from executing. 4. Blocks anonymous proxy servers by default. 5. Blocks newly installed applications by default
  • 17. www.escanav.com Anti-Malware Real time scanner to protect against ongoing mobile threats The latest mobile security technologies protects your device from viruses, spyware and more. Antivirus database updates with minimal impact on performance.
  • 18. www.escanav.com Privacy Advisor The Privacy Advisor provides a complete list of applications using the device permissions. Thus allowing you to keep a check on the security level of all installed applications.
  • 19. www.escanav.com Backup & Restore • Backup option gives you the advantage of backing up your contacts and SMS that are important to you. • eScan mobile security also comes with the restore option that helps retrieve your contacts and SMSs if your device is reverted back to it’s default factory settings.
  • 20. www.escanav.com Auto Update The option to update only when Wi-Fi is available forces eScan to download updates only when a valid Wi-Fi connection is available.
  • 21. www.escanav.com Recover Secret Code The eScan Mobile Security allows you to recover your secret code in case, if you have forgotten or lost the secret code. You need to specify a valid e-mail ID in the registration details because recovery of secret code is sent to your e-mail address
  • 22. www.escanav.com Customization eScan allows customization of its application to all partners, wherein they can have their company logo within eScan Mobile Security or eScan Tablet Security. e.g. Your logo
  • 23. www.escanav.com Customization Once customized your company logo will be shown within eScan Mobile Security or eScan Tablet Security If you want to customize the software, send in your logo in following size: Width - 60 pixels Height - 47 pixels * Android logo is taken from wallpaperswide.com
  • 24. www.escanav.com Licensing • Licensing Period – 1 Year – 2 Year – Unlimited (Lifetime / Perpetual) – 5 Year Note: License Key is not transferable to any other device
  • 25. www.escanav.com Reports of licenses downloaded & activated The Online portal gives a Report of the following - o Total installation count i.e. – Total number of downloads o Total Trial Installation Count i.e. – Total number of the trial version downloads. o Total Paid device count – Total number of devices that have installed a Purchased version .
  • 26. www.escanav.com 1. Mobile user will send SMS to Service Provider for activating 3G services. 2. In return, Service Provider will send confirmation SMS for 3G Services activation to mobile user along with eScan download link. Once mobile user download and install eScan, eScan will automatically send SMS to Service provider with registration informationeScan will download virus signatures from eScan server 1. If user sends sms to deactivate 3G services, Service Provider will send SMS for deactivation, upon receiving of the deactivation SMS eScan will be deactivated. 1. If user wants to reactivate the 3G service, he will send the SMS to SP, SP will send activation SMS to the device, upon receiving of the SMS eScan will get activated. Once the registration information is received by Service Providers ( SP ) SMS server, SMS server will update this information to eScan API hosted at SP, and eScan API will update this information on SP and eScan activation server ISP Model ( SMS based ) * For ISP model without SMS please contact our sales team at sales@escanav.com
  • 27. www.escanav.com Reports of licenses downloaded & activated http://db.escanav.com/mwscnew/antitheft_report.asp
  • 28. www.escanav.com eScan as a service o Scalable o Simple to buy o Free trial period o Flexible trial period: the partner can use different evaluation period o Usual business model: Automatic revenue sharing