The page may not load correctly.
The Control Center is provided free of charge. Learn more
Product system requirements can be found in the documentation.
As Android’s popularity grows so does criminals’ interest in the platform. Threats to Android are rather diverse: lockers, banking Trojans, programs that covertly send short messages, and many others.
This brochure describes the main reasons corporate networks get infected and what counteractive measures can be taken. It also discusses the anti-virus protection requirements for enterprises and organisations and offers a methodology for selecting security measures.Download brochure
2 years of protection for the price of 1
50% off when migrating for 1 year