SlideShare ist ein Scribd-Unternehmen logo
1 von 29
www.escanav.com
eScan Android Security
Ver: 1.1AP (030513)
www.escanav.comwww.escanav.com
Agenda
• What is eScan Mobile and Tablet Security
• Customization
• Business Models for Mobile Operators
www.escanav.comwww.escanav.com
Device Theft or Loss
1
Malwares and other threats
2
4
3
Unwanted Calls & SMS Filtering
5
Parental and unwanted application control for teenagers
Rogue Applications from market
2
Challenges
www.escanav.comwww.escanav.com
eScan Mobile and Tablet Security Features
www.escanav.com
Comparison
Features eScan Mobile Security eScan Tablet Security
Anti-Virus Yes Yes
Scheduled Updates Yes Yes
Call & SMS Filter Yes No
Backup and Restore Yes No
Parental & Application Control Yes Yes
Privacy Control Yes Yes
Anti-Theft Yes Yes
Notifications Yes Yes
Password Control Yes Yes
* Android logo is taken from wallpaperswide.com
www.escanav.com
Anti-Theft Features
• Locate your device, if it is lost or stolen.
• Remotely Block or Wipe your Device
• Maintain access to your device, even if its
SIM card is replaced
• Maintain remote access to your device
even if device does not support SIM card
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
If your device is lost or stolen…
1. Send an SMS from any second device to
your lost device number (lock:SecretCode)
2. Once the SMS is received – your lost device
is blocked !
… or the content is wiped if you’ve sent a
wipe command.
Anti-Theft : Block and Wipe
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : Locate via GPS
To locate your lost device…
1. Send an SMS from any second device
to your lost device number
2. Get a mapped location of your lost
device in your email!*
* the information is sent only when a
valid GPS connection is established
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : SIM Watch
Changing the SIM card in your device is the very first
thing a thief will do, in order to remain untraceable.
1. eScan Mobile Security is designed to autolock
when a new SIM is detected
2. The new number is secretly reported to you via
SMS and email
3. You then have a new number to Block, Wipe and
Locate remotely!
… or you can choose to report this number
to the police.
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.com
Anti-Theft : Scream
With eScan’s Scream feature you can make your device expel
an audible alarm.
1. You can rapidly find your device if you have
mislaid it somewhere.
2. The alarm can be activated via the Anti-Theft Web
Management portal or simply by sending your device a
special text message.
3. Your secret code can be used to deactivate the alarm.
*Anti-Theft Via SMS method is available in eScan for Mobile Security
www.escanav.comwww.escanav.com
What if a thief does
not replace the SIM card?
www.escanav.com
Anti-Theft : Without SIM
If SIM is not replaced or if the device does not house a SIM slot. Then what???
1. Register your device on eScan Anti-theft portal.
2. In case of device lost or stolen. Login to http://anti-theft.escanav.com with
your registered email id and password and remotely control your device.
* This feature needs an active internet connection on device
*Anti-Theft Without SMS method is available in eScan for Tablet Security
www.escanav.com
Call and SMS Filter
Block unwanted calls and SMSs from wasting
your precious time.
www.escanav.com
Call and SMS Filter
1. Received a call or a SMS from unknown
number?
2. Notification will be displayed to block or
allow the number.
3. Single-click to add this number to White List
or Black list
4. Wild card support
…e.g. you can block any number ending with 938
with following parameter %938
www.escanav.com
Parental & Application Control
Easily protect your kids from accessing
inappropriate websites & control the apps they
download.
www.escanav.com
Parental & Application Control
1. Restrict your child’s calls and SMSs.
2. Use GPS Find to locate your child in case
of an emergency.
3. Restrict unwanted applications from
executing.
4. Blocks anonymous proxy servers by
default.
5. Blocks newly installed applications by
default
www.escanav.com
Anti-Malware
Real time scanner to protect against ongoing
mobile threats
The latest mobile security technologies
protects your device from viruses, spyware
and more.
Antivirus database updates with minimal
impact on performance.
www.escanav.com
Privacy Advisor
The Privacy Advisor provides a complete list
of applications using the device permissions.
Thus allowing you to keep a check on the
security level of all installed applications.
www.escanav.com
Backup & Restore
• Backup option gives you the
advantage of backing up your
contacts and SMS that are important
to you.
• eScan mobile security also comes
with the restore option that helps
retrieve your contacts and SMSs if
your device is reverted back to it’s
default factory settings.
www.escanav.com
Auto Update
The option to update only when Wi-Fi is
available forces eScan to download
updates only when a valid Wi-Fi
connection is available.
www.escanav.com
Recover Secret Code
The eScan Mobile Security allows you to recover
your secret code in case, if you have forgotten
or lost the secret code. You need to specify a
valid e-mail ID in the registration details
because recovery of secret code is sent to your
e-mail address
www.escanav.com
Customization
eScan allows customization of its application to
all partners, wherein they can have their
company logo within eScan Mobile Security or
eScan Tablet Security.
e.g. Your logo
www.escanav.com
Customization
Once customized your company logo will be
shown within eScan Mobile Security or eScan
Tablet Security
If you want to customize the software, send in your
logo in following size:
Width - 60 pixels
Height - 47 pixels
* Android logo is taken from wallpaperswide.com
www.escanav.com
Licensing
• Licensing Period
– 1 Year
– 2 Year
– Unlimited (Lifetime / Perpetual) – 5 Year
Note: License Key is not transferable to any other device
www.escanav.com
Reports of licenses downloaded & activated
The Online portal gives a Report of the following -
o Total installation count i.e. – Total number of downloads
o Total Trial Installation Count i.e. – Total number of the
trial version downloads.
o Total Paid device count – Total number of devices that
have installed a Purchased version .
www.escanav.com
1. Mobile user will send SMS to Service
Provider for activating 3G services.
2. In return, Service Provider will send
confirmation SMS for 3G Services
activation to mobile user along with
eScan download link.
Once mobile user download and
install eScan, eScan will
automatically send SMS to Service
provider with registration
informationeScan will download virus signatures from
eScan server
1. If user sends sms to deactivate 3G services, Service
Provider will send SMS for deactivation, upon
receiving of the deactivation SMS eScan will be
deactivated.
1. If user wants to reactivate the 3G service, he will send
the SMS to SP, SP will send activation SMS to the
device, upon receiving of the SMS eScan will get
activated.
Once the registration information is
received by Service Providers ( SP ) SMS
server, SMS server will update this
information to eScan API hosted at SP, and
eScan API will update this information on SP
and eScan activation server
ISP Model ( SMS based )
* For ISP model without SMS please contact our sales team at sales@escanav.com
www.escanav.com
Reports of licenses downloaded & activated
http://db.escanav.com/mwscnew/antitheft_report.asp
www.escanav.com
eScan as a service
o Scalable
o Simple to buy
o Free trial period
o Flexible trial period: the partner can use different evaluation period
o Usual business model: Automatic revenue sharing
www.escanav.com
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total SecurityAbhijeet Guha
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Craig Rispin
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malwarejackadision
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesRozell Sneede
 
ADP03 - Home Security
ADP03 - Home SecurityADP03 - Home Security
ADP03 - Home SecurityChad Landman
 
ADP03 Home Security
ADP03 Home SecurityADP03 Home Security
ADP03 Home SecurityChad Landman
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationWiseKnow Thailand
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)shubh1112
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionCarol Witson
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 

Was ist angesagt? (20)

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Reflexion rtc
Reflexion rtcReflexion rtc
Reflexion rtc
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total Security
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
 
Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018Swiss-belhotel Security Scare Workshop May 3, 2018
Swiss-belhotel Security Scare Workshop May 3, 2018
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & viruses
 
ADP03 - Home Security
ADP03 - Home SecurityADP03 - Home Security
ADP03 - Home Security
 
ADP03 Home Security
ADP03 Home SecurityADP03 Home Security
ADP03 Home Security
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
KAV KIS 2015 Product Presentation
KAV KIS 2015 Product PresentationKAV KIS 2015 Product Presentation
KAV KIS 2015 Product Presentation
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
DEVICE SECURITY(BE PROTECTED FROM LOAN MAFIAS)
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 

Ähnlich wie eScan Android Presentation

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?buffetporch98
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
How to hack someones cell phone call log
How to hack someones cell phone call logHow to hack someones cell phone call log
How to hack someones cell phone call logissac228
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
How to spy on texts and calls
How to spy on texts and callsHow to spy on texts and calls
How to spy on texts and callsmakayla04
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?Sphere Soc
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
How to spy calls and sms
How to spy calls and smsHow to spy calls and sms
How to spy calls and smsmakayla04
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability ScanShawn Jordan
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
How to spy on my boyfriends text messages
How to spy on my boyfriends text messagesHow to spy on my boyfriends text messages
How to spy on my boyfriends text messagesmakayla04
 
Mobile Miner Installation
Mobile Miner InstallationMobile Miner Installation
Mobile Miner InstallationkingsBSD
 

Ähnlich wie eScan Android Presentation (20)

Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
How to hack someones cell phone call log
How to hack someones cell phone call logHow to hack someones cell phone call log
How to hack someones cell phone call log
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
How to spy on texts and calls
How to spy on texts and callsHow to spy on texts and calls
How to spy on texts and calls
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
How to spy calls and sms
How to spy calls and smsHow to spy calls and sms
How to spy calls and sms
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Amld lilly
Amld lillyAmld lilly
Amld lilly
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
How to spy on my boyfriends text messages
How to spy on my boyfriends text messagesHow to spy on my boyfriends text messages
How to spy on my boyfriends text messages
 
Mobile Miner Installation
Mobile Miner InstallationMobile Miner Installation
Mobile Miner Installation
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

eScan Android Presentation

  • 2. www.escanav.comwww.escanav.com Agenda • What is eScan Mobile and Tablet Security • Customization • Business Models for Mobile Operators
  • 3. www.escanav.comwww.escanav.com Device Theft or Loss 1 Malwares and other threats 2 4 3 Unwanted Calls & SMS Filtering 5 Parental and unwanted application control for teenagers Rogue Applications from market 2 Challenges
  • 5. www.escanav.com Comparison Features eScan Mobile Security eScan Tablet Security Anti-Virus Yes Yes Scheduled Updates Yes Yes Call & SMS Filter Yes No Backup and Restore Yes No Parental & Application Control Yes Yes Privacy Control Yes Yes Anti-Theft Yes Yes Notifications Yes Yes Password Control Yes Yes * Android logo is taken from wallpaperswide.com
  • 6. www.escanav.com Anti-Theft Features • Locate your device, if it is lost or stolen. • Remotely Block or Wipe your Device • Maintain access to your device, even if its SIM card is replaced • Maintain remote access to your device even if device does not support SIM card *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 7. www.escanav.com If your device is lost or stolen… 1. Send an SMS from any second device to your lost device number (lock:SecretCode) 2. Once the SMS is received – your lost device is blocked ! … or the content is wiped if you’ve sent a wipe command. Anti-Theft : Block and Wipe *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 8. www.escanav.com Anti-Theft : Locate via GPS To locate your lost device… 1. Send an SMS from any second device to your lost device number 2. Get a mapped location of your lost device in your email!* * the information is sent only when a valid GPS connection is established *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 9. www.escanav.com Anti-Theft : SIM Watch Changing the SIM card in your device is the very first thing a thief will do, in order to remain untraceable. 1. eScan Mobile Security is designed to autolock when a new SIM is detected 2. The new number is secretly reported to you via SMS and email 3. You then have a new number to Block, Wipe and Locate remotely! … or you can choose to report this number to the police. *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 10. www.escanav.com Anti-Theft : Scream With eScan’s Scream feature you can make your device expel an audible alarm. 1. You can rapidly find your device if you have mislaid it somewhere. 2. The alarm can be activated via the Anti-Theft Web Management portal or simply by sending your device a special text message. 3. Your secret code can be used to deactivate the alarm. *Anti-Theft Via SMS method is available in eScan for Mobile Security
  • 11. www.escanav.comwww.escanav.com What if a thief does not replace the SIM card?
  • 12. www.escanav.com Anti-Theft : Without SIM If SIM is not replaced or if the device does not house a SIM slot. Then what??? 1. Register your device on eScan Anti-theft portal. 2. In case of device lost or stolen. Login to http://anti-theft.escanav.com with your registered email id and password and remotely control your device. * This feature needs an active internet connection on device *Anti-Theft Without SMS method is available in eScan for Tablet Security
  • 13. www.escanav.com Call and SMS Filter Block unwanted calls and SMSs from wasting your precious time.
  • 14. www.escanav.com Call and SMS Filter 1. Received a call or a SMS from unknown number? 2. Notification will be displayed to block or allow the number. 3. Single-click to add this number to White List or Black list 4. Wild card support …e.g. you can block any number ending with 938 with following parameter %938
  • 15. www.escanav.com Parental & Application Control Easily protect your kids from accessing inappropriate websites & control the apps they download.
  • 16. www.escanav.com Parental & Application Control 1. Restrict your child’s calls and SMSs. 2. Use GPS Find to locate your child in case of an emergency. 3. Restrict unwanted applications from executing. 4. Blocks anonymous proxy servers by default. 5. Blocks newly installed applications by default
  • 17. www.escanav.com Anti-Malware Real time scanner to protect against ongoing mobile threats The latest mobile security technologies protects your device from viruses, spyware and more. Antivirus database updates with minimal impact on performance.
  • 18. www.escanav.com Privacy Advisor The Privacy Advisor provides a complete list of applications using the device permissions. Thus allowing you to keep a check on the security level of all installed applications.
  • 19. www.escanav.com Backup & Restore • Backup option gives you the advantage of backing up your contacts and SMS that are important to you. • eScan mobile security also comes with the restore option that helps retrieve your contacts and SMSs if your device is reverted back to it’s default factory settings.
  • 20. www.escanav.com Auto Update The option to update only when Wi-Fi is available forces eScan to download updates only when a valid Wi-Fi connection is available.
  • 21. www.escanav.com Recover Secret Code The eScan Mobile Security allows you to recover your secret code in case, if you have forgotten or lost the secret code. You need to specify a valid e-mail ID in the registration details because recovery of secret code is sent to your e-mail address
  • 22. www.escanav.com Customization eScan allows customization of its application to all partners, wherein they can have their company logo within eScan Mobile Security or eScan Tablet Security. e.g. Your logo
  • 23. www.escanav.com Customization Once customized your company logo will be shown within eScan Mobile Security or eScan Tablet Security If you want to customize the software, send in your logo in following size: Width - 60 pixels Height - 47 pixels * Android logo is taken from wallpaperswide.com
  • 24. www.escanav.com Licensing • Licensing Period – 1 Year – 2 Year – Unlimited (Lifetime / Perpetual) – 5 Year Note: License Key is not transferable to any other device
  • 25. www.escanav.com Reports of licenses downloaded & activated The Online portal gives a Report of the following - o Total installation count i.e. – Total number of downloads o Total Trial Installation Count i.e. – Total number of the trial version downloads. o Total Paid device count – Total number of devices that have installed a Purchased version .
  • 26. www.escanav.com 1. Mobile user will send SMS to Service Provider for activating 3G services. 2. In return, Service Provider will send confirmation SMS for 3G Services activation to mobile user along with eScan download link. Once mobile user download and install eScan, eScan will automatically send SMS to Service provider with registration informationeScan will download virus signatures from eScan server 1. If user sends sms to deactivate 3G services, Service Provider will send SMS for deactivation, upon receiving of the deactivation SMS eScan will be deactivated. 1. If user wants to reactivate the 3G service, he will send the SMS to SP, SP will send activation SMS to the device, upon receiving of the SMS eScan will get activated. Once the registration information is received by Service Providers ( SP ) SMS server, SMS server will update this information to eScan API hosted at SP, and eScan API will update this information on SP and eScan activation server ISP Model ( SMS based ) * For ISP model without SMS please contact our sales team at sales@escanav.com
  • 27. www.escanav.com Reports of licenses downloaded & activated http://db.escanav.com/mwscnew/antitheft_report.asp
  • 28. www.escanav.com eScan as a service o Scalable o Simple to buy o Free trial period o Flexible trial period: the partner can use different evaluation period o Usual business model: Automatic revenue sharing