The challenge Studies show that security issues are the main factors in holding companies back from rolling out full access for mobile phones users. So far the risks have been considered greater than the revenue. Meanwhile, mobile users tend to use not only mobile phones for access, but they (...) [more]
Splitstreem’s software security solution for portable storage
The challenge: portable storage devices security risk The multiplication of portable storage devices in large enterprises and government agencies challenges the IT security managers. How to allow powerful tools for its workforce while keeping the data on these tools fully protected and under (...) [more]
The challenge: all-in-one multiapplication card Smart card micro-controllers are widely used for applications including logical access to PC and networks (PKI), mobile phones (SIM cards), banking and public transport. However, most of the time these applications are performed on different (...) [more]
EU Project SERENITY’s Security Framework for Ambient Intelligence
The challenge: providing AmI environments security and dependability (S&D) In the ambient Intelligence (AmI) context dependability and security are crucial issues. In the AmI environment the personal sphere of individuals will be an open and evolving environment. Privacy is an increasing (...) [more]
KerPass’ mobile authentication and transaction validation application
The challenge: static password flaws In today distributed organizations, delivering reliable end user authentication is a difficult problem in search of a workable solution. Password based authentication is the workhorse of online authentication, and will remain so in the years to come as it (...) [more]