Related Links

  • F-Secure
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories


Mobile World Congress: F-Secure introduces Android and Symbian protection

14 February 2011

F-Secure has released version 7 of its Protection Service for Mobile (PSM 7) which extends the smartphone security software-as-a-service (SaaS) platform to support Google Android and Symbian handsets.

Launching the major update to PSM at the Mobile World Congress show in Barcelona, today, F-Secure says the service is now available to all cellular operators and mobile internet service providers.

In use, F-Secure says that PSM 7 allows operators to offer a comprehensive security and parental control as a service for all their customers' mobile devices, including smartphones and tablet computers.

According to the IT security vendor, as more and more children, teenagers and adults are surfing the internet with multiple devices, mobile security becomes an issue for everyone.

In use, PSM 7 is billed as securing internet browsing, social networking and mobile financial transactions, as well as keeping children safe from inappropriate and dangerous web content.

One of the most interesting features of the updated SaaS platform is its ability to perform remote tracking and wipes on a smartphone that has been lost or stolen.

Announcing PSM 7, Samu Konttinen, F-Secure's executive vice president for sales and marketing, said that the increasingly popular Android tablet computers and smartphones often contain confidential information such as photos and business documents which need to be protected from falling in the wrong hands.

"At the same time there is a clear need for parental control on the many mobile devices now used by children, as one in ten web pages are not suitable for them", he said.

"Thanks to the new generation of F-Secure's mobile security solution, our operator partners' customers can enjoy all their mobile devices to the full", he added.

This article is featured in:
Wireless and Mobile Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×