DescriptionLosing a smartphone or tablet PC is not just annoying for users – it is also extremely dangerous. If the device falls into the wrong hands, strangers can easily access personal data such as photos or contacts and make online purchases via installed shopping apps – at the victim's expense. Smartphones and the like are most frequently lost in public places – last year, at least 1,500 mobile devices were lost at Germany's largest airport in Frankfurt am Main (source: Fraport).
G Data MobileSecurity 2 provides reliable protection against mobile malware as well as real-time protection when surfing the net on a smartphone or tablet PC. In addition, users can block annoying callers and SMS senders, and contacts and their associated calls and messages can be password protected. Those who use their device for personal use as well as for work can thus protect their business contacts separately.
In addition, smartphone and tablet users can protect themselves from the disastrous consequences of a loss or theft. Devices can be located again and stored data can be deleted remotely to protect it from third party access. This provides optimum protection for mobile devices.
Protection while surfing: G Data MobileSecurity version 2 offers protection against phishing while surfing and so for example protects you when shopping online.
Protection against dangerous apps: The app check verifies the permissions of apps and categorises them.
Protection against Android viruses: As Android becomes more popular and more widely used, so the threat from corresponding viruses is increasing as well.
SMS and call filter: Block unwanted callers or SMS adverts easily by adding the sender to a blacklist.
Protection if the device is lost or stolen: If you have lost your device, you can use G Data MobileSecurity to locate or lock it via SMS.
Lock if SIM card is changed: You can forbid the use of a different SIM card. In addition, you are informed of the card change via SMS.
Password protection for apps: Use password protection to prevent specific apps from being launched. Hence for example you can avoid traffic costs from videos or prevent chargeable apps from being purchased.
Protected contacts: Using protected contacts puts these – and their associated calls and messages – into a protected area that only you can access via a password.