How to tackle secure protocols and mobile management

How to tackle secure protocols and mobile management

Cover


For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. From a security stance, all foreign networks, wired or wireless, should be regarded as hostile. However the ability to make a transparent wireless connection remains elusive due to the lack of standards in this area (especially around Wi-Fi) that inhibits the exploitation of de-perimeterisation.

Vendor:
ComputerWeekly.com
Posted:
25 Oct 2011
Published
10 Nov 2010
Format:
PDF
Length:
3 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy