August 2008
UNIX Update;Aug2008, Vol. 19 Issue 8, p8
Trade Publication
The article reports that Phoenix Technologies Limited of Milpitas, California, has signed its first customers for Phoenix FailSafe and Hypercore products. Woody Hobbs, president and chief executive officer (CEO) of Phoenix Technologies, said that the company is looking forward to work with customers and partners to improve user experience with more security and data protection capabilities for mobile telephones. Hobbs said that the company can give the most comprehensive firmware-based solution to all their hardware and device partners and to mobile telephone users.


Related Articles

  • Mobile Technology Creates Security Concerns.  // Credit Union Executive Newsletter;9/19/2005, Vol. 31 Issue 16, p5 

    Reports on the security concerns brought by mobile technology to company information. List of mobile devices which pose risks on data security; Comparison between the past and present way of breaching company security; Protective measures applicable against data breach. INSET: Security Measures...

  • Security: What will be hot in 2008? Antonopoulos, Andreas // Network World;1/7/2008, Vol. 25 Issue 1, p30 

    The author predicts the development in security for 2008. He said that there will be more security threats on mobile devices due to the increasing enterprise adoption of mobile platforms. Furthermore, he said that hard-drive encryption on the desktop will go on and will be distributed to the...

  • MCAFEE/PHOENIX TO DELIVER SECURED COMPUTING CLOUD.  // Computer Security Update;Oct2009, Vol. 10 Issue 10, p7 

    The article reports on the partnership between security technology company McAfee Inc. and Phoenix Technologies Ltd. to create a product for HyperSpaceâ„¢ on the computing environment of notebooks and netbooks in the U.S. Hyperspace users to experience new levels of virus, malware, and...

  • Untitled. Grant, Ian // Computer Weekly;2/16/2010, p34 

    The article presents information on the guidelines for protection of personal and company information while using social networks. Several rules have been published by cybersecurity agency Enisa (European Network and Information Security Agency) which include sensitive information should never...

  • A day in the life of mobile data. Allen, Martin // Management Services;Winter2005, Vol. 49 Issue 4, p14 

    The article discusses the importance of mobile devices to corporations. It relates a story wherein an employee's negligence of securing company data can result to planned or opportunistic theft. Mobile devices are a significant, increasing, and productive part of the information infrastructure...

  • Mobile Payments: Threats and Security Recommendations. Popov, Veselin // Proceedings of the International Conference on Application of In;2013, p164 

    This paper presents the process of influx of mobile payments in Bulgaria, which is influenced by a number of prerequisites. A model of cooperation is presented which ensures the broad implementation of mobile payments and the specific security threats and, on its basis, the respective...

  • An IT Manager's insight into Mobile Security. Allen, Martin // Manager: British Journal of Administrative Management;Apr/May2006, Issue 52, p22 

    The article offers tips in maintaining the security of mobile communication systems. INSET: Dispensing with Passwords -- a Case Study.

  • East-Asia-Intel.com: French counterintelligence fears Chinese infiltration of 3G networks -- March 3, 2010.  // East-Asia-Intel Reports;3/3/2010, p10 

    The article reports that according to Paris, France-based newsletter "Intelligence Online," French intelligence and security agencies are concerned that some Chinese companies involved in 3G networks, may have links with Chinese military. It is said that Chinese-made authentication keys are...

  • Mobile Devices Vulnerable To Hackers.  // Business Communications Review;May2004, Vol. 34 Issue 5, p6 

    Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics