How to tackle secure protocols and mobile management

How to tackle secure protocols and mobile management

Cover


For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. From a security stance, all foreign networks, wired or wireless, should be regarded as hostile. However the ability to make a transparent wireless connection remains elusive due to the lack of standards in this area (especially around Wi-Fi) that inhibits the exploitation of de-perimeterisation.

Vendor:
ComputerWeekly.com
Posted:
25 Oct 2011
Published:
10 Nov 2010
Format:
PDF
Length:
3 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.