{"id":1515,"date":"2006-11-01T00:00:00","date_gmt":"2006-11-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/01\/symantec-intros-anti-virus-software-for-windows-mobile\/"},"modified":"2021-12-30T11:39:31","modified_gmt":"2021-12-30T11:39:31","slug":"symantec-intros-anti-virus-software-for-windows-mobile","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/01\/symantec-intros-anti-virus-software-for-windows-mobile\/","title":{"rendered":"Symantec Intros Anti-virus Software for Windows Mobile"},"content":{"rendered":"<p>Security software market leader Symantec rolled out its latest package of anti-virus applications for Windows-based mobile devices.   Dubbed Mobile AntiVirus 4.0 for Windows Mobile, the product promises to help protect data stored on smart phones running the Microsoft operating system, including offering the ability to wipe out data present on lost or stolen devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While viruses attacking mobile devices remain rare, an increasing number of enterprises are handing out smart phones that store larger amounts of data, such as in mobile e-mail programs, driving the need for companies to adopt tools to protect sensitive corporate information traveling on the machines, according to Symantec.<\/p>\n<p>In a recent survey completed by the Cupertino, Calif.-based company, some 80 percent of enterprises indicated that they have begun distributing smart phones, with 75 percent of those companies admitting they have yet to employ any form of mobile security software.<\/p>\n<p>Despite the disparity, enterprises are beginning to shop for handheld anti-virus and security tools to avoid future security issues related to viruses and handhelds that go missing, said Paul Miller, managing director of mobile security at Symantec.<\/p>\n<p>With Windows Mobile device adoption predicted to rise significantly over the next several years as smart phones become cheaper and more useful, the number of threats targeting the handhelds will likely increase as well, the executive said.<\/p>\n<p>Along with the remote wipe-and-kill feature for what Miller refers to as &#8220;loss mitigation&#8221; in Mobile AntiVirus 4.0 for Windows Mobile, which allows users to delete information when they lose their device, the package boasts Symantec&#8217;s LiveUpdate Wireless service, which automatically updates phones&#8217; threat protection signatures to combat emerging threats.  The product also promises a centralized management feature that allows administrators to configure, lock, and enforce security policies on handsets from a single console interface.<\/p>\n<p>http:\/\/www.smartdevicecentral.com\/article\/Symantec+Intros+Antivirus+Software+for+Windows+Mobile\/192925_1.aspx<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1515","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1515"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1515\/revisions"}],"predecessor-version":[{"id":4002,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1515\/revisions\/4002"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}