Compaq Armada E700 Wireless Security - Page 9
Connectivity Technologies
View all Compaq Armada E700 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 9 highlights
Wireless Security White Paper 9 Key features of F-Secure FileCrypto for PocketPC are the following: • Encrypts documents in selected folders on the fly • Strong real-time encryption with 128-bit Blowfish • Allows creation of user-specified encrypted folders • Supports removable media • Automatic installation through a host PC to the PDA device at next ActiveSync • Minimum length and character set of pass-phrase can be defined • ActiveSync protected by the same pass-phrase • Automatic encryption at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. For more information on F-Secure products see http://www.fsecure.com. SecurID SecurID is a two-factor authentication technique that combines a user's PIN with the operations of an external authenticator device to produce a secure user login. The SecurID external authenticator may be implemented as a key fob, smart card, or software token. It generates a unique code every sixty seconds in strict synchronicity with the server. The user's login password combines the SecurID code with his or her PIN. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through a wireless VPN connection. Software-based firewalls are available from third-party providers. One such product is Black Ice, available from Network ICE Corporation. Notwithstanding the protection offered, such firewalls are often not incorporated into the access device; either because of the small hard drives of handheld devices or through lack of a corporate security policy (or enforcement of same) requiring such use. Connectivity Technologies The second key juncture in the pipe, after wireless access devices, is a range of wireless connectivity technologies. These technologies provide the infrastructure, standards, and protocols that permit information to travel wirelessly between mobile clients and the wired lines that provide access to corporate servers. Different connection technologies are used at different times, depending on the availability and efficiency of each connection type at any given time. • Internal users use a wireless connection at work to stay connected while they roam. For example, they can send and receive e-mail while attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is a platform-independent WAP micro-browser enabling a variety of computing systems...to access the mobile Internet environment. ( http://www.ezos.com)