1. Using data security services
Features an open Android Market to open opportunities forhackers. The best security comes from providers such as Good Technology that secures the phone using its own networkoperations center, software on the phone and servers behind thefirewall.
Technology can encrypt data as it passes to and from the deviceand the data stored is also encrypted.
2. Working closely with manufacturers of mobile phones
Mobile phone manufacturers like Motorola and Samsungdeveloping products for the company's services. For example,developed a version of Samsung's TouchWiz software to support the advanced encryption standard security and VPN connections.
Motorola's newly acquired 3LM, software companies that are on the phone and the server can encrypt data to and from the deviceand set the VPN to corporate data.
3. Limiting the use of security model
For example the Motorola Droid Pro allows to remotely removethe SD card that forces the user create a new password followingthe specified time.
4. Virtual machine technology
VMware is working on a virtual machine that lets mobile users switch between the two phones. Department of InformationTechnology can set policy on mobile phone company persona.
5. Wearing basic security management tool
Sybase, BoxTone, Zenprise, Mobile Iron and Fiberlink is a company that offers mobile device management. Even basicmobile device management products help IT administratorsenforce policies such as password requirements and delete the data if lost or stolen. (MED / Ezz)
0 comments:
Post a Comment