TITLE

Enterprise Screams for Network Security

AUTHOR(S)
Rockwell, Mark
PUB. DATE
November 2006
SOURCE
Wireless Week;11/1/2006, Vol. 12 Issue 22, p37
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology devices have to protect the data on the devices. Telwares is instructing corporations on how to build wireless security policies that treat mobile devices as critical links in corporate networks.
ACCESSION #
23056289

 

Related Articles

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...

  • Risk.  // Canadian Underwriter;Mar2014, Vol. 81 Issue 3, p12 

    This section offers news briefs on market risks in Canada as of March 2014. According to the 2014 Global Economic Crime Survey, 1 in 3 respondents said that their businesses were subject to economic crime. CyberEdge Group report suggests the concern of information technology security...

  • NQ Mobile Keeps Falling After Denying Fraud Claim. Kevin Shalvey // Investors Business Daily;10/28/2013, pA01 

    NQ Mobile and some other China Internet stocks fell Friday, even after the mobile security firm fired back against a short seller's charges of fraud.

  • Delfigo extends keyboard biometrics to the iPhone.  // MarketWatch: Global Round-up;Nov2009, Vol. 8 Issue 11, p201 

    The article reports on the move of Delfigo Security to extend its services from personal computers and laptops to mobile devices, primarily the iPhone. It notes the services provided by Delfigo with its keyboard biometrics capabilities for authentication purposes. It highlights the ways on how...

  • Mobile Tech Security Standards Being Developed.  // Government Video;May2011, Vol. 22 Issue 6, p17 

    The article reports on the development of a mobile technology security standards on wireless products by the Office of Management and Budget (OMB) in the U.S.

  • Mobile Privacy and Security: The Next Frontier of IT Risk Management. Piccoli, Gabriele // Cutter Benchmark Review;Jun2010, Vol. 10 Issue 6, p3 

    The article discusses various reports published within the issue, including one by Katia Passerini on principles for safeguarding privacy on mobile devices, one by Lanse LaVoy on smartphones as the ultimate mobile computing device, and another on "Please Rob Me" that help secure mobile platforms.

  • A MOVING TARGET. Chen, Anne // eWeek;01/15/2001, Vol. 18 Issue 2, p45 

    Reports on the development of security systems for mobile commerce. Security challenges for personal digital assistants and Wireless Application Protocol phones; Access of critical enterprise data and systems. INSET: The push is on for wireless security.

  • RSA to focus on mobile, cloud security. Greene, Tim // Network World;1/23/2012, Vol. 29 Issue 2, p14 

    The article reports on the product strategy of RSA, a security division of EMC Corp., in the U.S. in 2012 and notes that the company focuses on the scheme that includes embedding SecurID technology in mobile devices.

  • This Month In AV TECHNOLOGY.  // Systems Contractor News;Apr2011, Vol. 18 Issue 4, p8 

    The article offers updates related to technology including the impact of analog sunset on end-users, the introduction of scalable video coding (SVC), which allows videoconferencing over Internet, and the move of reporter Pam Derringer to investigate questions of security with mobile and wireless...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics