• Sybase offers enterprise-ready iPhone solution

    Sybase yesterday announced a new version of iAnywhere Mobile Office with expanded iPhone support and availability on the iPhone App Store. Sybase's approach for enhanced security and usability make...

  • RIM makes takeover bid for encryption vendor Certicom

    BlackBerry maker RIM is looking to gain more control over the security components of its platform by launching a hostile takeover of Certicom, a vendor of encryption technology for the BlackBerry a...

  • Open System Authentication (OSA)

    Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a w...

  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses i...

Mobile Authentication and Encryption

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Two-factor authentication: Mobile security at your fingertips

    Two-factor authentication -- the security process that requires two means of identification, one of which is usually a physical token such as a fingerprint, the other typically being a password -- is more complex than using just one authentication me... 

  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and ... 

  • Avoiding data breaches through mobile encryption

    Compare mobile encryption alternatives and their ability to prevent stored data theft, reducing the biggest risk posed by lost or stolen devices, in this tip. 

  • Laptop crypto: Do it, but realize it's not a panacea

    Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. 

  • Evolving 'intelligent encryption' techniques

    Learn about intelligent encryption that works within the confines of the OS to protect read and write file system calls and temp files. 

  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Open System Authentication (OSA)

    Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive ... 

  • LEAP (Lightweight Extensible Authentication Protocol)

    LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections... (Continued) 

  • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

    Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.11i standard for wireless local area networks (WLANs), particularly those using WiMax technology... (Continued) 

  • drive-by spamming

    Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam. 

  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Learning guide: Mobile device protection

     

  • Sybase offers enterprise-ready iPhone solution on the App Store

    Sybase yesterday announced a new version of iAnywhere Mobile Office with expanded iPhone support and availability on the iPhone App Store. Sybase's approach for enhanced security and usability make it the first in the middleware space to encrypt all ... 

  • Two-factor authentication: Mobile security at your fingertips

    Two-factor authentication -- the security process that requires two means of identification, one of which is usually a physical token such as a fingerprint, the other typically being a password -- is more complex than using just one authentication me... 

  • RIM makes hostile takeover bid for encryption vendor Certicom

    BlackBerry maker RIM is looking to gain more control over the security components of its platform by launching a hostile takeover of Certicom, a vendor of encryption technology for the BlackBerry and many other mobile platforms. 

  • Open System Authentication (OSA)

    Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive ... 

  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and ... 

  • iPhone encryption is a must for the security-conscious enterprise

    Apple is advertising the iPhone 3G as something that consumers can use at work. IT managers with high security requirements beg to differ. They want full device encryption and centralized policy enforcement before they'll even let one in the building... 

  • LEAP (Lightweight Extensible Authentication Protocol)

    LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections... (Continued) 

  • See more All on Mobile Authentication and Encryption
About Mobile Authentication and Encryption

Explore mobile authentication and encryption resources that will help you design an effective mobile security strategy in this section. Read the latest mobile authentication and encryption news and find out about new approaches using mobile authentication and encryption technologies to secure your mobile devices. Find advice on to secure your mobile devices using authentication and encryption including tips for effective mobile device security and learn how these technologies can keep your mobile devices safe while you realize the business benefits for using mobility to empower your workforce.