How to tackle secure protocols and mobile management

How to tackle secure protocols and mobile management

Cover


For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming. From a security stance, all foreign networks, wired or wireless, should be regarded as hostile. However the ability to make a transparent wireless connection remains elusive due to the lack of standards in this area (especially around Wi-Fi) that inhibits the exploitation of de-perimeterisation.

Vendor:
ComputerWeekly.com
Posted:
25 Oct 2011
Published:
10 Nov 2010
Format:
PDF
Length:
3 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!