• Shared Key Authentication (SKA)

    Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol... (Continued)

  • Mobile health care deployment: Technical requirements

    IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.

  • Wireless Transport Layer Security (WTLS)

    Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.

  • On-device defenses for mobile malware

    As workforces grow increasingly dependent on smartphones, mobile threats warrant serious consideration. As discussed last month, mobile malware barriers are falling fast, at precisely the time when...

Mobile Security Software and Tools

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Protecting your corporate laptops

    In this special report, you'll discover how to protect your laptops from hackers and thieves and learn what to do if one of your corporate laptops is stolen. You'll also find information to help your employees safeguard their laptops while traveling.... 

  • Wireless Hacks, 2nd Edition: Hack 71 -- Wall off your wireless

    Hack 71 from Wireless Hacks, Second Edition teaches you how to build a tiny wireless firewall using a wide range of PC hardware and a BSD firewall. 

  • Products of the Year 2005

    You are invited to submit your company's mobile product(s) to be considered for our Products of the Year awards. Winning products will be highlighted in a special feature on SearchMobileComputing.com in January 2005. 

  • Oracle Mobile Security Suite rehashes Identity Manager and Bitzer Mobile

    Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add. 

  • Sybase adds antivirus and firewall to mobile management suite

    Sybase iAnywhere is expanding its mobile security capabilities. With the rise of mobile malware, a smartphone doesn't have to be stolen or lost to be vulnerable to attack. With new antivirus and firewall features, the company is taking its Afaria mob... 

  • Web site documents wireless threats, vulnerabilities

    Network Chemistry has launched the industry's first public database to aggregate and communicate wireless vulnerabilities and exploits. The site alerts network administrators and IT managers of potential threats, before any damage is done. 

  • This cell phone fraud has a familiar ring

    A new study says the mobile content industry is losing billions through ringtone theft and fraud -- a trend that will continue if the market doesn't wizen up. 

  • New mobile device knows it's you

    The VTT Technical Research Center of Finland has patented a device that has sensors to monitor the walking style of its owner. This technology has the potential to prevent millions of portable appliances from being stolen every year. 

  • Nokia picks Symantec for its smartphone security

    Nokia Inc. signed an agreement to include Symantec Corp.'s mobile security software in its Series 60 advanced cellular phone. Phones that run the Symbian operating system will come preload with the Symantec anti-virus software. 

  • Air Force base capitalizes on wireless system from IBM

    An Air Force base in Utah has recruited a new wireless system from IBM that it believes will save millions of dollars -- and a lot of time -- moving parts for its fighter jets. 

  • Bluefire catches on at Johns Hopkins

    Bluefire Security Technologies has released its Mobile Firewall Plus software for securing handheld devices, and an IT director with Johns Hopkins Medicine says his company is using it to update PDA security profiles and to keep patient medical data ... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Shared Key Authentication (SKA)

    Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol... (Continued) 

  • Wireless Transport Layer Security (WTLS)

    Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications. 

  • PEAP (Protected Extensible Authentication Protocol)

    PEAP (Protected Extensible Authentication Protocol) is a version of EAP created to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control... (Continued) 

  • screaming cell phone

    A screaming cell phone is a cellular telephone that is programmed to emit a noise like human screaming. (Continued) 

  • Stratellite

    A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks. (Continued...) 

About Mobile Security Software and Tools

Learn about mobile device security software and tools including how to create a secure mobile environment in this topic section. Discover mobile software and tools that are currently available to secure your mobile devices and learn how to implement these mobile security solutions. Read how forward-thinking organizations are using mobile security software and tools to safekeep their mobile devices, smartphones, laptops, notebooks and netbooks.