TREND MICRO Mobile Security 1.0 for ios Product Guide

Size: px
Start display at page:

Download "TREND MICRO Mobile Security 1.0 for ios Product Guide"

Transcription

1 H TREND MICRO Mobile Security 1.0 for ios Product Guide V1.2 Trend Micro, Inc N. De Anza Blvd. Cupertino, CA T / F

2 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2014 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro Mobile Security 1.0 for ios Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Mobile Security. At Trend Micro, we are always seeking to improve our documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us. DOCUMENT PROFILE: Product Name: Trend Micro Mobile Security 1.0 for ios Document Title: Trend Micro Mobile Security 1.0 for ios - Product Guide Document Filename: PG - Mobile Security 1.0 ios - Product Guide GL v1.2 Document Release Date: February 26, 2014 Team: Consumer Technical Product Marketing 2

3 Table of Contents Trend Micro Mobile Security Overview... 4 Chapter 1: Introducing Trend Micro Mobile Security... 5 Key Features... 5 System Requirements... 7 Incompatible Software... 7 Internet 3G-4G Connection... 7 Recommended Environment... 7 Target Market... 7 Availability... 8 Contacting Trend Micro... 8 Chapter 2: Getting Started with Trend Micro Mobile Security... 9 Download and Install Trend Micro Mobile Security... 9 Chapter 3: Exploring Trend Micro Mobile Security Overview of the Mobile Security Console Safe Surfing Security Lost Device Protection Scan Facebook Backup & Restore Between ios and Android Devices Transferring Licenses Between Devices Settings Mobile Security On Your ipad Appendix: QR Code to Apple App Store About Trend Micro

4 Trend Micro Mobile Security Overview Trend Micro Mobile Security 1.0 for ios protects your iphone or ipad from privacy threats, loss, data theft, and viruses. Utilizing the cloud-based security of Trend Micro s Smart Protection Network and Mobile App Reputation technologies, it stops threats before they reach you. Installing easily from the Apple App Store onto your iphone or ipad, Trend Micro Mobile Security 1.0 for ios provides the following essential features: SafeSurfing. Uses the Trend Micro Smart Protection Network to block malicious websites. Security. Scans every app you download or have installed to filter out viruses, malicious apps, and spyware that can steal your information and cost you money. Includes unlimited updates and cloud-based scanning for continuous protection. Lost Device Protection. Remotely locate a lost or stolen device on a Google map using GPS, Cell Towers, or Wi-Fi. Trigger an alarm on your device, even if it is in silent mode. Scan Facebook. Scan your Facebook privacy settings. Helps you to adjust them to increase your privacy and to protect from data theft. Cross-Platform Backup & Restore. Backup and Restore your Contacts between your ios and Android devices. Jailbreak Protection. Warns you if the jailbroken device is vulnerable. Uninstall Protection. Prevents unauthorized removal of Mobile Security by requiring a password. Figure 1. Trend Micro Mobile Security for ios (Scrolling Down) 4

5 Chapter 1: Introducing Trend Micro Mobile Security This chapter introduces you to Trend Micro Mobile Security 1.0 for ios. The topics discussed in this chapter include: Key Features System Requirements Incompatible Software Internet 3-G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Key Features O Available only for Premium customers o Available for all customers - Not available Table 1. Trend Micro Mobile Security Feature Comparison Protection Android ios Kindle Virus Scanner/Security: Apps Scans every app you install and every one you download to filter out virus and malicious apps that can steal your information and cost you money Virus Scanner/Security: Updates Unlimited updates to virus protection files Virus Scanner/Security: Cloud Features unlimited cloud scanning connections to ensure continuous protection Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions o o o o o o o o o O - - O O O O - O 5

6 Table 2. Trend Micro Mobile Security Feature Comparison (Con t) Protection Android ios Kindle Call and Text Blocking Filters calls and texts with whitelist and blacklist Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode O - - O O - Lost Device Protection: Remote Lock / Wipe Enables you to remotely lock your device (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) / Allows you to perform a factory reset of the device from the web portal to erase all your personal data. O - - Lost Device Protection: SIM Card Protection Automatically locks your device if the SIM card is removed (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) O - - Backup and Restore Backup your photos, contacts*, calendar, videos, voice memos, music (up to 50 MB for Free, 5GB for Premium). (*Cross-platform Backup and Restore of Contacts between ios and Android.) Scan Facebook Scan Facebook verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password) No Advertising There is no 3 rd party advertising displayed in the app Online Technical Support Offers support provided via online forums, knowledgebase, and o o - O O - O - O o o o o o o 6

7 System Requirements Table 3. System Requirements Requirements Description Operating Systems Android OS 2.2 and above ios 7 Device Space Memory Other At least 18MB disc space At least 65MB memory 3G-4G (LTE) Wi-Fi Internet Connection *SMS blocking functions are not supported on Android OS 4.4 *Compatible with Kindle Fire, Fire HD, HD 8.0, HDX, HDX 8.9 (as of April 24, 2014); not compatible with Kindle Paperwhite *Compatible with iphone 4, 4S, 5, 5C; ipad 2, 3, 4, Air; Mini 1, Mini 2, itouch 5 Incompatible Software To identify software that you should remove from the device before installing Trend Micro Mobile Security, please refer to the following Web site: Internet 3G-4G Connection Trend Micro Mobile Security uses a Wi-Fi Internet or 3G-4G connection for activating the program online, checking the expiration date, downloading updates, sending Trend Micro URL/web queries and logs to the portal, logging into the management portal, and browsing knowledge-based pages on the Trend Micro Web site. 3G-4G data connections fees are usually charged on a monthly basis, using a fixed allocation with an upper limit. If you exceed this limit, you will be charged additional fees for the amount of time connected or for the amount of data downloaded. Testers are therefore encouraged to use a Wi-Fi router-based connection to the Internet whenever possible. Recommended Environment This Product Guide assumes that you are using Trend Micro Mobile Security in conjunction with a PC or Mac, so you can log in to the Trend Micro Mobile Security Portal easily at and review your Lost Device Protection settings and execute certain actions. ios users who also have an Android smartphone or tablet can test the cross-platform Backup and Restore functions for Contacts. Target Market Trend Micro Mobile Security is targeted to mobile users who wish to secure their iphones and ipads from malicious applications, web threats to them and their family, unwanted calls and messages, and device loss. 7

8 Availability February 24, 2013 Apple App Store, itunes Contacting Trend Micro Trend Micro Incorporated North De Anza Blvd. Cupertino, CA Tel: (408) or (800) Fax: (408) Further information is available at 8

9 Chapter 2: Getting Started with Trend Micro Mobile Security This chapter gets you started with Trend Micro Mobile Security. Topics discussed in this chapter include: Downloading and Installing Trend Micro Mobile Security Registering to Your Trend Micro Account Buying / Activating a License Note: Trend Micro Mobile Security is bundled with Titanium Maximum Security and Titanium Premium Security. To download the bundled software, users of these editions can simply launch the Trend Micro Titanium Console. A link to the Mobile Security download is available both in the Welcome screen and in the Computer tab of the Console. Download and Install Trend Micro Mobile Security To download and install Trend Micro Mobile Security: 1. Tap the Apple App Store icon on your ios device to load it. The Apple App Store screen appears. 2. Tap the Search icon at the bottom to load the search field. The Search field appears and your ios keyboard pops up. 3. Type Trend Micro in the search field and when the Trend Micro page appears, scroll down to Trend Micro Mobile Security in the list and tap the listing. The Trend Micro install page appears. Figure 2. Apple App Store Figure 3. Search Apple App Store 9

10 4. Scroll to the right until you see the Trend Micro Mobile Security panel. Match the icon to the one you see on the right. 5. Tap Free; when it changes to Install, tap it again. The Apple App Store displays a popup, asking you to Sign In to itunes Store. 6. Enter your password for your Apple ID and tap OK. The app downloads and installs. When installation is complete, you re presented with a screen to Open the app. 7. Tap Open. A screen appears, saying Mobile Security Would Like to Send You Push Notifications. 8. Tap Don t Allow or OK. Two preliminary instructional screens appear, explaining the benefits of Trend Nicro Mobile Security, which includes the SafeSurfing browser. 9. Tap Next and Done to proceed through the screens. The License Agreement screen appears. Figure 4. Trend Micro Mobile Security & Antivirus Figure 6. Open Figure 5. Sign In to itunes Store Figure 7. Push Notifications Figure 8. Next Figure 9. Done 10

11 10. Tap Trend Micro License Agreement to read it. If you accept the terms of the agreement, tap Accept. 11. A demo screen for the SafeSurfing browser and Actions Required appears, indicating when a website is safe and when actions are required. 12. Tap the demo screen. This shows the SafeSurfing browser screen behind it. 13. In the upper lefthand corner of the SafeSurfing browser, tap the numbered icon. 14. A second demo screen appears, showing you how to return to SafeSurfing. Tap the demo screen to continue. Figure 10. License Agreement Figure 11. Demo for SafeSurfing Actions Required Figure 12. SafeSurfing Browser Figure 13. SafeSurfing Demo 11

12 15. The main Mobile Security Console appears, with the Action Required dropdowns showing. 16. Tap Set up Trend Micro account to get complete protection. The Set Up Account screen appears. 17. Tap Set Up Account. The Sign In screen appears. 18. Option 1: If you don t have a Trend Micro account, tap Create an Account below the Sign In button. The Create an Account screen appears. 19. Type in your Address, First and Last Names, select your Region, then scroll down and tap Next. Figure 14. Action Required Figure 15. Set Up Account 20. A screen appears for you to Confirm Your Address. Enter a password for your new account, and confirm it. Figure 16. Sign In Figure 17. Create an Account 21. If you wish, check Receive the latest news and offers from Trend Micro, scroll down and tap Create Account. Trend Micro Mobile Security is registered to your account and the Mobile Security Console appears. Figure 18. Confirm Figure 19. Mobile Security Console 12

13 22. OPTION 2: If you already have a Trend Micro account, enter your address and Password and tap Sign In. Trend Micro Mobile Security is activated and linked to your Trend Micro Account. 23. You may now begin using Trend Micro Mobile Security. The Premium features will be active for free for 30 days, after which you ll need to buy a subscription. Figure 20. Sign In Figure 7. Mobile Security Console To Activate a Subscription Using an Activation Code: Once you have bought your subscription, you ll receive an Activation Code in your order confirmation or inside the retail box. You ll need to enter the Activation Code into Mobile Security to activate the license. 1. Tap Buy/Activate in the Mobile Security Console. The Buy/Activate screen appears. 2. Tap Use Activation Code to open the screen to enter your code. 3. Enter the 20-character string without the dashes (which are entered for you) and tap OK. 4. Your subscription is activated and the new expiration date appears in the Settings screen. Figure 22. Buy / Activate > Use Activation Code Figure 23. Enter Activation Code 13

14 Chapter 3: Exploring Trend Micro Mobile Security This chapter provides an overview of Trend Micro Mobile Security (TMMS). Topics discussed in this chapter include: Overview of the Mobile Security Console SafeSurfing Security Lost Device Protection Scan Facebook Backup and Restore Between ios and Android Devices Transferring Licenses Between Devices Settings Mobile Security on your ipad Overview of the Mobile Security Console Once installed, an icon for Trend Micro Mobile Security for ios (itmms) appears on your ios mobile device. To launch the Mobile Security Console: 1. Tap the Trend Micro Mobile Security icon on your ios device to load the Console. 2. Use the internet Globe in the upper right to launch the SafeSurfing browser to safely surf the Web. 3. The Status Banner (e.g., Action Required ) lets you perform remedial actions on your device. 4. SafeSurfing provides a SafeSurfing Report on sites scanned and malicious websites blocked. Figure 8. TMMS Console > SafeSurfing Virus Scanner 5. Security scans apps and files for viruses and spyware. 14

15 6. Scroll down the Console. 7. Lost Device Protection lets helps you locate your device or trigger an alarm. 8. Scan Facebook lets you scan your Facebook privacy settings. 9. Scroll down the Console. 10. Backup & Restore lets backup and restore your Contacts between ios and Android devices. 11. Settings lets you configure your Mobile Security settings. 12. Buy/Activate lets you buy a subscription or activate one using a Key code. Figure 25. Lost Device Protection Scan Facebook Figure 26. Backup & Restore Settings Buy/Activate Safe Surfing To ensure Safe Surfing: 1. Back in the main Console, tap the Globe icon in the upper right to open the SafeSurfing browser. The browser appears. 2. In the location bar, enter the URL of the website you wish to browse. For example, type or and tap Go. Figure 27. Safe Surfing Figure 28. Safe Surfing Browser 15

16 3. If the site is malicious or potentially so, SafeSurfing blocks it to protect you. 4. If you still want to visit this website despite the risk, tap proceed anyway. (Not recommended) 5. Back in the main page of the Console, tap Safe Surfing for a report of malicious websites blocked. The Safe Surfing Report screen displays, indicating which sites it has blocked. 6. Scroll down the Console to the bottom and tap Settings to modify your SafeSurfing level. The Settings screen appears. 7. In Settings, scroll down to SafeSurfing, then tap the slider to turn Website Filtering on or off. 8. Tap Protection Strength, then check the protection level you prefer: High. Blocks websites showing any signs of transmitting malicious software, including suspicious websites that may not actually cause problems. Normal. Protects against malicious software, online fraud, and other threats, without aggressively blocking minor security risks. Low. Only blocks sites confirmed as fraudulent or malicious. Figure 29. Website Blocked Figure 31. SafeSurfing Report Figure 33. Protection Strength Figure 30. SafeSurfing Panel Figure 32. Settings > SafeSurfing 16

17 Security To use Security: 1. Tap Security in the TMMS Console. The Security screen appears, with a list of past apps scanned. 2. Tap Scan / Rescan to conduct a malware scan on demand. A progress screen appears, showing you the progress of the scan. 3. When the scan is complete, the Security screen reappears, with an updated list of apps scanned. Malicious apps are deleted. Figure 34. Security Figure 35. Security > Apps/Processes Scanned List Figure 36. Security > Scanning Apps 17

18 Lost Device Protection To enable Lost Device Protection: 1. Back in the main Console, tap Lost Device Protection. The Lost Device Protection screen appears, with instructions to turn on Location Services. 2. Tap Turn It On Now to turn on the services. 3. If Location Services are not automatically turned on, follow the instructions in the Device Not Located screen to turn them on. Figure 37. Main Console Lost Device Protection Figure 38. Lost Device Protection Figure 39. Instructions for turning on Location Services Figure 40. Settings > Location Services > Mobile Security 18

19 4. Once Lost Device Protection is activated, tap its panel in the Console and a Device Located screen displays, with a link to the Lost Device Protection Portal 5. Copy and this link to your PC or Mac, so you can access the portal should you lose your device. Figure 41. Lost Device Protection Device Located Lost Device Protection Portal To access the Lost Device Protection Portal: 1. Launch your browser on your PC and type into the search field, and hit Enter. The Lost Device Protection Portal webpage appears. 2. Tap Find Now or Sign in to sign into your Trend Micro account. The Sign In page appears. 3. Type the address and password you used to create your Trend Micro account and click Sign in. The Lost Device Protection Portal appears, with the location of your device shown on the Google map. Zoom the map for a closer view. Figure 42. Lost Device Protection Portal Sign In Figure 43. Sign In 19

20 4. Click Share to share the device s location with a trusted nearby friend. 5. Click Scream to sound a one-minute alarm on your misplaced device, even if it has been set to silent mode. 6. Click Refresh to refresh the Google map. 7. Click Device Detail (below the device icon on the upper left of the portal) to view device details about your subscription. Figure 44. Lost Device Protection Options Figure 45. Unlock 20

21 Scan Facebook Trend Micro Mobile Security also provides a Scan Facebook utility. Using Scan Facebook, you can scan and edit your Facebook privacy settings. To access Scan Facebook: 1. Tap Scan Facebook in the main Console. The Scan Facebook screen appears for you to sign into your Facebook account. 2. Tap Sign into Facebook. A screen appears for you to sign in. Figure 46. Scan Facebook Figure 47. TMPSA Free Download 3. Enter the address and password you used to activate your Facebook account and tap Log In. 4. Mobile Security scans Facebook for privacy concerns. When it s done checking, it presents you with the analysis. Figure 48. Facebook Login Figure 49. Checking Your Privacy Settings 21

22 5. Tap each item in the list to reset it to the recommended setting. A popup appears, letting you change the Privacy Setting. 6. Tap the recommended Privacy Setting (e.g., Friends), then tap OK to enter it. Mobile Security makes the change, telling you Great! You fixed this concern. 7. In the future, whenever Facebook makes a policy change for your Privacy Settings, for example, simply tap Scan Facebook in the Console to recheck your privacy settings. Figure 50. Privacy Concern Figure 51. Scan Facebook Figure 52. Check Settings 22

23 Backup & Restore Between ios and Android Devices Trend Micro Mobile Security for ios provides Backup & Restore for your Contacts. You can back up all the Contacts on your device and restore them to it or another ios or Android device. To Back Up Your Contacts: 1. Tap Backup & Restore in the Console. A popup appears, asking Mobile Security Would Like to Access Your Contacts. 2. Tap OK to allow the access. The Back Up screen appears. 3. Tap Back Up to back up your Contacts. If your device is not plugged in, MBR advises you to plug it in during the backup to not drain your battery. 4. While it s backing up, Mobile Security provides a screen to show you the progress of the backup. Figure 53. Backup and Restore Figure 54. Access Contacts Figure 55. Back Up Figure 56. Backup in Progress 23

24 5. When the backup process is complete, a popup appears, indicating the results of the backup. 6. If any contacts were not backed up, you can try another backup later. 7. To ensure the safety of your Contacts, Regular Backup is turned on after a backup. Or you may turn this on by tapping Set Up Now at the bottom of the screen. Figure 57. Partial Backup Complete Figure 58. Regular Backup To Restore Your Contacts: 1. Tap Backup & Restore in the Console. The Backup & Restore screen appears, with a banner indicating the number of backups you have, plus items to Restore Contacts and Manage Backups. 2. Tap Restore Contacts. A screen appears with the list of backup sets you can restore. Figure 59. Backup and Restore Figure 60. Restore Contacts Manage Backups 24

25 3. If you have Trend Micro Mobile Security on your Android device and have completed backups for it (e.g., DROID RAZR) and your ios device is registered to the same account your Android backups will also be listed here, along with your ios backups. 4. Tap the backup you wish to restore. A popup appears, asking if you re sure you wish to restore the contacts backup and giving details about the restoration. 5. If you do, tap Restore. Mobile Security restores the contacts in that backup to the device. Figure 61. Restore Contacts List Figure 62. Restore Contacts? Managing Backups: 1. As you accumulate backups, you can delete old ones to free up space in your account. 2. In the Backup & Restore screen, tap Manage Backups. The Manage Backups screen appears. 3. Tap the backup you wish to review or delete. The Backup Details screen appears. Figure 63. Manage Backups Figure 64. Manage Backups 25

26 4. Review the backup, which indicates the number of contacts and size. If you wish, tap Delete to delete the backup. A popup appears, asking if you re sure you want to delete the backup. 5. Tap Delete in the popup to confirm deletion of the backup. 6. Mobile Security returns you to the Manage Backups screen, with the backup deleted. Figure 65. Backup Details Figure 66. Delete Backup? Figure 67. Backup Deleted 26

27 Transferring Licenses Between Devices Trend Micro Mobile Security allows you to transfer licenses between devices, whether they re ios or Android. You can do this as you register a device to an account, or at any time, using the license transfer function. To Transfer a License Between Devices: 1. In the main screen of the Console, tap Settings. The Settings screen appears. 2. Tap Transfer a license to this device. A screen appears for you to initiate the transfer. 3. Tap the license that you want to transfer to this device. A popup appears, indicating your purchased protection will be immediately disabled on the previous device and enabled on this one, asking Do you want to continue? 4. Tap OK to transfer the license. 5. A popup indicates that the subscription has been transferred to the new device. Figure 68. Transfer a license Figure 69. Transfer License List Figure 70. Disable Message Figure 71. Subscription Updated 27

28 Settings To Access System Settings: 1. Tap Settings at the bottom of the main Console to open Settings. 2. Scroll down to review the options in the Settings screen. ACCOUNT & SUBSCRIPTION SCAN FACEBOOK: Activate Service. Log in to Facebook account. BACKUP & RESTORE Regular Backup. Turn on to perform a data backup regularly. Trend Micro Account. Shows account to which you re registered. Expiration Date. Expiration date for your subscription Figure 72. Settings (1) Buy / Activate. Buy now or use an Activation Code. Sign Out. Disconnect your Trend Micro account (needs password). Check your Trend Micro account. Manage your account and subscriptions. SAFESURFING: Website Filtering. Turn filtering on and off. Protection Strength. Set strength to Low, Normal, or High. Figure 73. Settings (2) 28

29 ABOUT AND HELP About. Provides version number. Help. Online Help. Start collecting log. Collect a lot to assist with troubleshooting. Figure 74. Settings (3) 29

30 Mobile Security On Your ipad Trend Micro Mobile Security 1.0 for ios is the same program on your ipad as your iphone, with the same key functionality. Naturally, the larger form factor allows for the full display of all panels without scrolling. 1. Tap the Trend Micro Mobile Security icon on your ipad and the Mobile Security Console appears. 2. Use the internet Globe in the upper right-hand corner to launch the SafeSurfing browser to safely surf the Web. 3. The Status Banner lets you perform remedial actions on your device. (It s Protected as shown, but changes to Action Required when Mobile Security detects something that needs fixing.) 4. SafeSurfing provides a SafeSurfing Report on sites scanned and malicious websites blocked. 5. Security scans apps and files for viruses and spyware. 6. Lost Device Protection lets helps you locate your device or trigger an alarm. 7. Scan Facebook lets you scan your Facebook privacy settings. Figure 75. Trend Micro Mobile Security on the ipad (Vertical View) 8. Backup & Restore lets backup and restore your Contacts between ios and Android devices. 9. Settings lets you configure your Mobile Security settings. 10. Buy/Activate lets you buy a subscription or activate one using a Key code. 30

31 When you hold your ipad horizontally, Trend Micro Mobile Security reconfigures the panels. Figure 76. ipad (Horizontal View) 31

32 Appendix: QR Code to Apple App Store The QR Code below (also seen on the cover of this guide) can be scanned to take you to the Trend Micro Mobile Security page in the Apple Store (ITunes): 32

33 About Trend Micro Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest web threats. Visit TrendWatch at to learn more about the threats and Trend Micro Smart Protection Network. Trend Micro s flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro s trusted security solutions are sold through its business partners worldwide. Please visit Copyright 2014 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, and Titanium are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. Legal Notice: Trend Micro licenses this service in accordance with terms and conditions set forth in the License Agreement. If you wish to review the License Agreement prior to purchase, visit: If you (or the company you represent) do not agree to these terms and conditions, you may contact your service representative for a full refund. 33

34 34

TREND MICRO Mobile Security 5.0 for Android Product Guide

TREND MICRO Mobile Security 5.0 for Android Product Guide H TREND MICRO Mobile Security 5.0 for Android Product Guide V1.1 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Trend Micro Antivirus for Mac 2016

Trend Micro Antivirus for Mac 2016 H Trend Micro Antivirus for Mac 2016 Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3 H TREND MICRO SafeSync 5.1 for Consumer Product Guide SSFC - GLOBAL v2.3 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Consumer

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

DirectPass Password Manager for PC

DirectPass Password Manager for PC H Trend Micro DirectPass Password Manager for PC Product Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro Incorporated

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Password Manager for PC and Android

Password Manager for PC and Android H Trend Micro Password Manager for PC and Android Product Guide Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

ios How to Back Up from icloud

ios How to Back Up from icloud ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,

More information

Password Manager Product Guide for PC and Android

Password Manager Product Guide for PC and Android H Password Manager Product Guide for PC and Android Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Setting up Channel-21 Secure RSS CEP on

Setting up Channel-21 Secure RSS CEP on Setting up Channel-21 Secure RSS CEP on Important Information About C21 CEP Podcasts itunes iphone / ipad Android Phone/Tablet Demo Videos Important Information about Channel-21 CEP Channel-21 Digital

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Quick Start Guide. PC, Mac, Android & ios

Quick Start Guide. PC, Mac, Android & ios Quick Start Guide PC, Mac, Android & ios Installation for PC Please refer to the Trend Micro website for detailed system requirements. If you encounter difficulties while installing or activating this

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

OfficeSuite HD Meeting User Manual

OfficeSuite HD Meeting User Manual OfficeSuite HD Meeting User Manual Welcome to Broadview Networks OfficeSuite HD Meeting. Our service unifies cloud video conferencing, simple online meeting and mobile collaboration into one easy-to-use

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

Frequently Asked Questions for logging in to Online Banking

Frequently Asked Questions for logging in to Online Banking Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices

Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices Following are the steps necessary to register and enroll an Apple ios 8 device with the University s AirWatch

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. SD Logo is a trademark of its proprietor.

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

P90X App for iphone and Android FAQ

P90X App for iphone and Android FAQ P90X App for iphone and Android FAQ GETTING STARTED 1.) Does the P90X App for iphone and Android replace the P90X, P90X2, and P90X3 DVD systems, or does it complement them? The P90X App works in conjunction

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. This document will help you understand your Mobile Wi-Fi so you can start using it right

More information

PNY DUO-LINK On-The-Go Flash Drive for iphone and ipad. User Manual

PNY DUO-LINK On-The-Go Flash Drive for iphone and ipad. User Manual PNY DUO-LINK On-The-Go Flash Drive for iphone and ipad User Manual Table of Contents 1. Introduction 2. System Requirements 3. Physical Descriptions 4. DUO-LINK App Installation 5. Using DUO-LINK App 5.1

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Mobility with Eye-Fi Scanning Guide

Mobility with Eye-Fi Scanning Guide Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

Getting Started with Zoom

Getting Started with Zoom Getting Started with Zoom The Institute of Agriculture has recently purchased a site license for a new cloud-based video conferencing service known as Zoom. If you have ever connected to a GoToMeeting,

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Wind River Financial iprocess Setup Guide for IOS Devices

Wind River Financial iprocess Setup Guide for IOS Devices Wind River Financial iprocess Setup Guide for IOS Devices (Requires ios 4.3 or later. Compatible with iphone, ipad, and ipod touch. This app is optimized for iphone 5.) Table of Contents (Clickable Links):

More information

Business Media Platform (BMP)

Business Media Platform (BMP) (BMP) The BWW (BMP) is an in-house BWW communications platform, controlled, developed and owned by BWW, utilizing and maximizing Apple, Cloud and Internet technologies, compatible with ios and Android

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

User Manual. Product Model: MiTraveler 7D-4A. OS: Android 4.0

User Manual. Product Model: MiTraveler 7D-4A. OS: Android 4.0 User Manual Product Model: MiTraveler 7D-4A OS: Android 4.0 Tablet of Contents Specifications.1 What s inside the box 2 Tablet Parts 2 Getting started...2 Connection to Internet..6 Task Bar..8 Install

More information

Welcome to XO WorkTime

Welcome to XO WorkTime Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Apple Deployment Programs Apple ID for Students: Parent Guide

Apple Deployment Programs Apple ID for Students: Parent Guide Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows

More information

High-Speed Internet Quick Start Guide

High-Speed Internet Quick Start Guide High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? Call 1.800.239.4430 or visit Frontier.com/HelpCenter Contents PART #1: Wi-Fi Router Setup... 4 PART #2: Configure Wi-Fi Router... 8

More information

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere

More information

support@escanav.com http://forums.escanav.com escan Mobile Security for Android

support@escanav.com http://forums.escanav.com escan Mobile Security for Android support@escanav.com http://forums.escanav.com escan Mobile Security for Android Introduction 3 Features added 3 System Requirements 3 Installation 4 Features of escan Mobile Security for Android 4 Antivirus

More information

Avira Secure Backup INSTALLATION GUIDE. HowTo

Avira Secure Backup INSTALLATION GUIDE. HowTo Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

N750 WiFi DSL Modem Router Premium Edition

N750 WiFi DSL Modem Router Premium Edition Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the label of your product and use it to register your product at https://my.netgear.com.

More information

LIBRARY MEMBER USER GUIDE

LIBRARY MEMBER USER GUIDE LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download Zinio Reader 4... 10 a) For your PC... 10 b) For your

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

User Guide. for Card Reader and Payment Application

User Guide. for Card Reader and Payment Application User Guide for Card Reader and Payment Application Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

Sophos Mobile Control User guide for Windows Mobile

Sophos Mobile Control User guide for Windows Mobile Sophos Mobile Control User guide for Windows Mobile Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on a Windows Mobile device...

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information