"Behavioral analysis of threats" - warns about any suspicious application activity in the phone. Detection of newly emerging threats, as well as checking all the applications, files, folders and Memory Card happen in real time.
"BlokVor" - a multi-level data protection system, through which you can control and prevent malicious actions in case of theft or loss of a smartphone.
"Safe Room" - contact, which in case you lose your smartphone will be sent to that device was installed in someone else's SIM-card. If necessary, this function can be restored password protection settings solution ESET NOD32 Mobile Security.
"Call Control" - blocking unwanted incoming and outgoing calls. This feature helps protect children from unwanted calls and not pay unexpected bills for extra services of mobile operators.
"Blocking the hidden rooms» (CLIR) - A new anti-spam function, through which you can ignore calls to phone numbers that are defined as "Private number".
«SMS / MMS spam" - feature allows you to get rid of unwanted SMS and MMS-messages. The user can configure the "black" and "white" list of contacts to fend for themselves or their loved ones of unnecessary information and dangerous relationships.
«GPS-discovery" - the definition of the location of the phone when it is lost or stolen with the help of a remote SMS-command.
"Built-in security audits" - checks on the results of the mobile device user is provided with full information about the state of the system, including information about running applications, battery, Bluetooth, memory and connected devices.
"Remote locking" - to prevent unauthorized access to personal data on the mobile device user can lock the phone with the help of SMS-commands from any telephone.
"Security at a distance" - the loss of mobile devices can be confident in the security of personal data. Sending an SMS-command from any phone, you can remove not only the contacts and messages, photos and writing.
"Protection from removal" - now in ESET NOD32 Mobile Security for Android is a new feature - the self-defense applications. An attacker can not easily remove the application without the knowledge of specific combinations defined by the user.