Enterprise Screams for Network Security

Rockwell, Mark
November 2006
Wireless Week;11/1/2006, Vol. 12 Issue 22, p37
Trade Publication
The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology devices have to protect the data on the devices. Telwares is instructing corporations on how to build wireless security policies that treat mobile devices as critical links in corporate networks.


Related Articles

  • Delfigo extends keyboard biometrics to the iPhone.  // MarketWatch: Global Round-up;Nov2009, Vol. 8 Issue 11, p201 

    The article reports on the move of Delfigo Security to extend its services from personal computers and laptops to mobile devices, primarily the iPhone. It notes the services provided by Delfigo with its keyboard biometrics capabilities for authentication purposes. It highlights the ways on how...

  • Cracks in the WAP. Chan, Tony // America's Network;02/15/2000, Vol. 104 Issue 3, p26 

    Focuses on the security problems faced by Wireless Applications Protocol (WAP)-based information and transaction services. Cellular technology encryption; Security solutions for WAP; Shortage of solutions for mobile commerce security.

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • Make mobile working safer. Lannin, David // SC Magazine: For IT Security Professionals (UK Edition);Oct2006, p20 

    The author emphasizes the need for companies to secure their wireless networks. He cites the benefits of a mobile workforce. He mentions different methods for securing wireless networks. He claims that mobility and convergence benefits of mobile structure are realized within a secure...

  • Mobile VAS--from fantasy to reality. Chanay, Xavier // Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102 

    Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications...

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...

  • Security in Wireless Networks. Tillison, Joe // ECN: Electronic Component News;May2010, Vol. 54 Issue 6, p20 

    The article discusses the security vulnerability of wireless systems based on the research of InGuardians Inc. It says that the weak spot of any secure wireless system is the inadequate safeguarding of the security keys. It mentions that to win the public's confidence with these new gadgets,...

  • Bluetooth Wireless Network Authentication Using Radio Frequency Communication Protocol. Waleed, Ghossoon M.; Faizal, M.; Ahmad, R. B.; Malek, M. Fareq B. Abd; Ghani, M. Alif // Journal of Computer Science;2009, Vol. 5 Issue 9, p646 

    Problem statement: Bluetooth has emerged as very popular ad hoc network standard today. Bluetooth network applications include wireless synchronization, e-mail/internet/intranet access using local personal computer connections, hidden computing through automated applications and networking. Due...

  • SOUND OFF!  // Wireless Week;4/1/2004, Vol. 10 Issue 8, p4 

    Presents a survey on efforts of wireless corporations to protect employees' mobile devices from hackers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics