Compaq nc6000 Wireless Security - Page 7

Emerging Mobile Applications

Page 7 highlights

EAP and many other EAP implementations. For more details please visit http://www.hp.com/products/security Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In addition to the advantages of WPA, 802.11i has the following advantages and issues: Advantages • Stronger Encryption dictates use of Advanced Encryption Standard (AES) • Supports roaming Issues • An extra hardware upgrade is required, in order to implement AES. • *Products are not widely available (Products will carry WPA2 logo as a certification of 802.11i ) * HP Notebooks with WPA2 Certification are available Emerging Mobile Applications The rise of the Internet and wireless connectivity increased the demand for security and pervasive access to data from heterogeneous networks. The risk grew as static web pages evolved into dynamic and active server pages, or even remote procedure calls over http. Hewlett Packard has had the optimal solution for this complicated problem since 1980, and can provide more robust security to mail, database and web servers. The HP solution is based on Trusted Operating system (TOS). One aspect of using this is reverse proxy. 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

7
EAP and many other EAP implementations.
For more details please visit
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
In addition to the advantages of WPA, 802.11i has the following advantages and issues:
Advantages
Issues
• Stronger Encryption dictates use of Advanced Encryption
Standard (AES)
• Supports roaming
• An extra hardware upgrade is required, in order to
implement AES.
• *Products are not widely available (Products will carry
WPA2 logo as a certification of 802.11i )
*
HP Notebooks with WPA2 Certification are available
Emerging Mobile Applications
The rise of the Internet and wireless connectivity increased the demand for security and pervasive
access to data from heterogeneous networks. The risk grew as static web pages evolved into
dynamic and active server pages, or even remote procedure calls over http.
Hewlett Packard has had the optimal solution for this complicated problem since 1980, and can
provide more robust security to mail, database and web servers. The HP solution is based on
Trusted Operating system (TOS). One aspect of using this is reverse proxy.