Security Systems Aim At Handhelds

February 2006
Business Communications Review;Feb2006, Vol. 36 Issue 2, p6
Trade Publication
The article reports on that investments for network security will include handheld devices, content, intrusion prevention systems, and network access control. Infonetics Research Inc. found out that the software, hardware appliances and secure routers will be the preferred form factors for implementing security technologies through 2007.


Related Articles

  • Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers. Ren-Junn Hwang; Sheng-Hua Shiau // Computer Journal;2007, Vol. 50 Issue 5, p602 

    An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network...

  • A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.  // Computer Journal;2007, Vol. 50 Issue 5, p591 

    Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analysed by researchers from the computer security community (using automated proof tools), a simplified version of the protocol is only recently proven secure...

  • SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS. Likhar, Praveen; Yadav, Ravi Shankar; Rao M., Keshava // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p97 

    Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the...

  • Mobile devices impact WLANs. Gilby, Christian // Communications News;Jan2008, Vol. 45 Issue 1, p28 

    The article discusses the considerations in the selection of wireless local area networks (WLANs). The system should provide security mechanisms which allow access to the network and blocks inappropriate devices. WLANs must not degrade the quality-of-service of mobile devices such as adapter...

  • Skype Huge Threat For Business.  // Database & Network Journal;Dec2005, Vol. 35 Issue 6, p15 

    The article comments on the threat posed by Skype to businesses. Skype has a closed nature of protocol which means all clients are based on the same code. Skype's ease of use is partially facilitated by a firewall; this poses further danger to administrators who may not realize the VoIP activity...

  • Level One WAP-0003.  // Australian Personal Computer;May2004, Vol. 24 Issue 5, p70 

    Security is a big concern for both network administrators and first-time users, and the Level One Wireless Access Protocol (WAP)-0003's approach to security is impressive. This access point supports 128-bit wired equivalent privacy encryption, as well as the ability to turn off service set...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

  • Wi-Fi Voice Handset Market Expanding.  // Business Communications Review;Apr2005, Vol. 35 Issue 4, p6 

    The worldwide market for voice over Wi-Fi handsets reached $45 million on sales of 113.000 units in the year 2004, according to Infonetics Research Inc. Growth will be strong through 2009, the market research house predicts. One of the most promising capabilities in this space remains a nascent...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics