Mobile Authentication and Encryption News
March 24, 2009
Sybase yesterday announced a new version of iAnywhere Mobile Office with expanded iPhone support and availability on the iPhone App Store. Sybase's approach for enhanced security and usability make it the first in the middleware space to encrypt all...
December 08, 2008
BlackBerry maker RIM is looking to gain more control over the security components of its platform by launching a hostile takeover of Certicom, a vendor of encryption technology for the BlackBerry and many other mobile platforms.
August 06, 2008
Apple is advertising the iPhone 3G as something that consumers can use at work. IT managers with high security requirements beg to differ. They want full device encryption and centralized policy enforcement before they'll even let one in the ...
March 03, 2008
Sybase iAnywhere updates Information Anywhere to allow road warriors to tap into business applications through email client.
Mobile Authentication and Encryption Get Started
Bring yourself up to speed with our introductory content
Google is beginning to encrypt data by default on its Android devices. Expert Michael Cobb explains how this change will affect enterprise BYOD security. Continue Reading
Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive... Continue Reading
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. LEAP is designed to provide more secure authentication for 802.11 ... Continue Reading
Problem Solve Mobile Authentication and Encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Two-factor authentication -- the security process that requires two means of identification, one of which is usually a physical token such as a fingerprint, the other typically being a password -- is more complex than using just one authentication ... Continue Reading
Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and... Continue Reading
Compare mobile encryption alternatives and their ability to prevent stored data theft, reducing the biggest risk posed by lost or stolen devices, in this tip. Continue Reading