Nokia counters malware threat to data on its smartphones

Nokia and Symantec are working to improve mobile security on Nokia smartphones.

Nokia and Symantec are working to improve mobile security on Nokia smartphones.

Under the arrangement, Nokia will be able to preload its Series 60 and Symbian devices with Symantec's mobile security software, giving business users protection against mobile malware.

Nokia and Symantec aim to protect personal information, such as contact databases, stored on smartphones as well as connected networks.

"Mobile devices are changing the way consumers and businesses live and work," said Sarah Hicks, vice-president of mobile and wireless solutions at Symantec.  "As more and more data, including financial and personal details, is stored on mobile devices, it is increasingly at risk from malware threats."

Symantec has been working with Nokia for more than two years to develop security technology and systems for mobile devices. The new agreement lets Nokia provide increased protection for Series 60 smartphones.

Security is based on Symantec's Autoprotect feature, which runs continuously in the background on the smartphone and checks for malicious code in SMS, EMS, MMS, HTTP and e-mail files. Users can also manually scan applications and file archives. 

A built-in firewall blocks suspicious incoming and outgoing connection attempts on the phone's Lan/Wan connection. Symantec Liveupdate wireless technology provides the smartphone with security updates downloaded via the wireless network.

 

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close