Stratégies Télécoms & Multimédia

français
  • Home Page
  • Newsletter
  • Sitemap Page
  • Contact
  • Home Page
  • Services
  • Events
  • European Webzine
  • Interview
  • News
  • Innovators’ Profiles
  • Trends
  • Agenda
  • About
  • Past Issues
Innovators’ profile
Font size up Font size down Print RSS field

To send this page
Supplement all the fields below and click on "OK" button...

Name: Add a message:
E-Mail Address*:
Recipient's Email adress*:
Reset   Send
(*) Mandatory fields Close
AppGate Secure Mobile Office combines security and mobility
19 February 2009 - Innovators’ Profiles
The challenge Studies show that security issues are the main factors in holding companies back from rolling out full access for mobile phones users. So far the risks have been considered greater than the revenue. Meanwhile, mobile users tend to use not only mobile phones for access, but they (...) [more]

Splitstreem’s software security solution for portable storage
5 May 2008 - Innovators’ Profiles
The challenge: portable storage devices security risk The multiplication of portable storage devices in large enterprises and government agencies challenges the IT security managers. How to allow powerful tools for its workforce while keeping the data on these tools fully protected and under (...) [more]

LEGIC card-in-card solutions
1 April 2008 - Innovators’ Profiles
The challenge: all-in-one multiapplication card Smart card micro-controllers are widely used for applications including logical access to PC and networks (PKI), mobile phones (SIM cards), banking and public transport. However, most of the time these applications are performed on different (...) [more]

EU Project SERENITY’s Security Framework for Ambient Intelligence
29 February 2008 - Innovators’ Profiles
The challenge: providing AmI environments security and dependability (S&D) In the ambient Intelligence (AmI) context dependability and security are crucial issues. In the AmI environment the personal sphere of individuals will be an open and evolving environment. Privacy is an increasing (...) [more]

KerPass’ mobile authentication and transaction validation application
29 February 2008 - Innovators’ Profiles
The challenge: static password flaws In today distributed organizations, delivering reliable end user authentication is a difficult problem in search of a workable solution. Password based authentication is the workhorse of online authentication, and will remain so in the years to come as it (...) [more]

 
Search by Topic:

Search by Topic: 
Subscribe to the Newsletter      Top of the page

 Your e-Mail address: 
Subscribe Unsubscribe
Free subscription
The last news - Flux RSS
• AppGate Secure Mobile Office combines security and mobility
(19 February 2009 - Innovators’ Profiles)
The challenge Studies show that security issues are the main factors in holding companies back from rolling out full access for mobile phones (...)
• ETSI works on quantum cryptography for communication security
(3 November 2008 - News)
ETSI has launched an Industry Specification Group dedicated to quantum cryptography.
• Open Access to EU funded Research Articles
(6 October 2008 - Trends)
The European Commission will give unrestricted online access to EU-funded research results under FP7 program.
Diary

Have a look on the next Events:

ICT 2008, Lyon, France, 25-27 November 2008 , The biennial ICT Event (...) ... [more] NPSec, 4th workshop on Secure Network Protocols, October 19-22, 2008, Orlando, Florida, ... [more]


  • Home Page
  • Services
  • Events
  • European Webzine
  • Newsletter
  • Sitemap Page
  • Legal Mentions
  • Contact