Droid-X

Droid-X is an anti-virus solution exclusive for Android,
and is optimized for a mobile environment that is rapidly changing.



Droid-X

Droid-X is an anti-virus solution exclusive for Android, and is optimized for a mobile environment that is rapidly changing.



Major functions


Droid-X, which was first introduced in the domestic financial industry in 2010, is the third generation mobile vaccine program that combines the robust malicious code search engine and variant malicious code response engine.


Detailed test of the routing device

Not only a particular file but also the process, permission, filecheck, and property are inspected


Preventing Phishing and the installation of illegal Apps

Blocking the installation of both existing malicious Apps and new Apps


Malicious App/Worm test

Protecting the smart phone from malicious code by monitoring events


Various test options

Simple detailed test/Similar pattern-based test


Live update

Simultaneous update of the blacklist pattern and engine


Supported OS

Android 2.0 or later.


Major functions


Droid-X, which was first introduced in the domestic financial industry in 2010, is the third generation mobile vaccine program that combines the robust malicious code search engine and variant malicious code response engine.


Detailed test of the routing device

Not only a particular file but also the process, permission, filecheck, and property are inspected


Preventing Phishing and the installation of illegal Apps

Blocking the installation of both existing malicious Apps and new Apps


Malicious App/Worm test

Protecting the smart phone from malicious code by monitoring events


Various test options

Simple detailed test/Similar pattern-based test


Live update

Simultaneous update of the blacklist pattern and engine


Supported OS

Android 2.0 or later.


Characteristics and strengths




Droid-X service process


The Droid-X vaccine security module provides various functions (malicious code blocking, phishing prevention, checking the status of risk exposure, illegal App check) using the following process.




Reference



Related products