Compaq Evo n800c Wireless Security - Page 9

Connectivity Technologies - hard drive

Page 9 highlights

Wireless Security White Paper 9 Key features of F-Secure FileCrypto for PocketPC are the following: • Encrypts documents in selected folders on the fly • Strong real-time encryption with 128-bit Blowfish • Allows creation of user-specified encrypted folders • Supports removable media • Automatic installation through a host PC to the PDA device at next ActiveSync • Minimum length and character set of pass-phrase can be defined • ActiveSync protected by the same pass-phrase • Automatic encryption at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. For more information on F-Secure products see http://www.fsecure.com. SecurID SecurID is a two-factor authentication technique that combines a user's PIN with the operations of an external authenticator device to produce a secure user login. The SecurID external authenticator may be implemented as a key fob, smart card, or software token. It generates a unique code every sixty seconds in strict synchronicity with the server. The user's login password combines the SecurID code with his or her PIN. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through a wireless VPN connection. Software-based firewalls are available from third-party providers. One such product is Black Ice, available from Network ICE Corporation. Notwithstanding the protection offered, such firewalls are often not incorporated into the access device; either because of the small hard drives of handheld devices or through lack of a corporate security policy (or enforcement of same) requiring such use. Connectivity Technologies The second key juncture in the pipe, after wireless access devices, is a range of wireless connectivity technologies. These technologies provide the infrastructure, standards, and protocols that permit information to travel wirelessly between mobile clients and the wired lines that provide access to corporate servers. Different connection technologies are used at different times, depending on the availability and efficiency of each connection type at any given time. • Internal users use a wireless connection at work to stay connected while they roam. For example, they can send and receive e-mail while attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is a platform-independent WAP micro-browser enabling a variety of computing systems...to access the mobile Internet environment. ( http://www.ezos.com)

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

Wireless Security White Paper
9
Key features of F-Secure FileCrypto for PocketPC are the following:
Encrypts documents in selected folders on the fly
Strong real-time encryption with 128-bit Blowfish
Allows creation of user-specified encrypted folders
Supports removable media
Automatic installation through a host PC to the PDA device at next ActiveSync
Minimum length and character set of pass-phrase can be defined
ActiveSync protected by the same pass-phrase
Automatic encryption at power-off
Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten
Compaq iPAQ Pocket PC’s ship with F-Secure today. For more information on F-Secure
products see
.
SecurID
SecurID is a two-factor authentication technique that combines a user's PIN with the operations of
an external authenticator device to produce a secure user login. The SecurID external
authenticator may be implemented as a key fob, smart card, or software token. It generates a
unique code every sixty seconds in strict synchronicity with the server. The user's login password
combines the SecurID code with his or her PIN.
RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the
EZOS WAP micro-browser called EzWAP.
3
Device-Specific Firewalls
Industry best practices dictate the use of a device-mounted firewall when connecting to the
Internet, especially through a wireless VPN connection. Software-based firewalls are available
from third-party providers. One such product is Black Ice, available from Network ICE
Corporation. Notwithstanding the protection offered, such firewalls are often not incorporated
into the access device; either because of the small hard drives of handheld devices or through lack
of a corporate security policy (or enforcement of same) requiring such use.
Connectivity Technologies
The second key juncture in the pipe, after wireless access devices, is a range of wireless
connectivity technologies. These technologies provide the infrastructure, standards, and protocols
that permit information to travel wirelessly between mobile clients and the wired lines that
provide access to corporate servers. Different connection technologies are used at different times,
depending on the availability and efficiency of each connection type at any given time.
Internal users use a wireless connection at work to stay connected while they roam. For
example, they can send and receive e-mail while attending meetings in conference rooms.
Generally, wireless local area networks (WLANs) will facilitate this usage.
3
EzWAP 2.0 is a platform-independent WAP micro-browser enabling a variety of computing systems…to access the mobile Internet
environment. (
)