How to tackle secure protocols and mobile management

How to tackle secure protocols and mobile management

Cover


For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. From a security stance, all foreign networks, wired or wireless, should be regarded as hostile. However the ability to make a transparent wireless connection remains elusive due to the lack of standards in this area (especially around Wi-Fi) that inhibits the exploitation of de-perimeterisation.

Vendor:
ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Nov 10, 2010
Format:
PDF
Type:
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!