InvestorsHub Logo
Followers 19
Posts 1035
Boards Moderated 0
Alias Born 10/20/2003

Re: None

Monday, 02/19/2007 9:33:38 PM

Monday, February 19, 2007 9:33:38 PM

Post# of 249251
Pretty convincing dots here?

http://www.globalexecutiveforum.net/Security.htm


Sprint Mobile Security offers unmatched seamless end-user security for mobile workforce

Sprint launched Sprint Mobile Security, which is powered by Mobile Armor and is the only security solution from any carrier that allows complete end-to-end security management for laptops and mobile handheld devices. It is a new service available in the Sprint Mobility Management portfolio, which also includes billing and device management services and is the only integrated package designed to work across multiple carriers and device and operating system (OS) platforms.
"Wireless security issues concern enterprise customers looking to expand wireless access to a broader range of corporate applications," said Rena Bhattacharyya, industry analyst at IDC. "Sprint Mobile Security addresses these concerns by bundling services that mitigate security risks and threats into a pre-packaged solution designed to be easy to install, use and pay for."
Sprint Mobile Security is designed to meet three major needs: data protection, threat prevention and compliance.
Data Protection
Sprint Mobile Security protects data by enforcing password policies across all devices with fixed, PIN or color-coded credentials. It also allows companies to encrypt individual files or an entire device and memory card using AES or 3DES, and the mobile VPN allows users to securely connect to the corporate intranet while on the go.
Threat Prevention
Sprint Mobile Security protects mobile devices from viruses, worms and Trojans that can infect devices and spread malware via text messages or Bluetooth connectivity. It scans, identifies and removes these malicious codes, and its firewall blocks "denial of service" attacks and restricts network traffic based on source, destination, IP ports and applications. Sprint Mobile Security can also lock and delete data on a device if the device is lost or stolen.
Compliance
Sprint Mobile Security enables companies to enforce policies to ensure that only corporate-sanctioned applications are on their devices and that government and industry regulations are being met. It can enforce more than 150 policies from a single online portal. Sprint Mobile Security also offers automatic remediation, which will update non-compliant programs or profiles automatically, without requiring user intervention. This feature simplifies the user experience and enhances productivity so that users are not locked out of applications or services.
"With Sprint Mobile Security, companies have access to the highest level of security expertise, tools and customer service to ensure complete protection for their unique and evolving enterprise security needs," said Barry Tishgart, director of product marketing for Sprint. "Companies can have confidence knowing that their assets are secure and proprietary data is protected and compliant with corporate policy."




http://www.mobilearmor.com/industry_04a.html

Industry Solutions

Government - Military

Government agencies constantly face pressure to protect vital information from disclosure. Whether the data is related to intelligence, monetary policy or court cases, the data must be protected from both internal and external threats. With the increased use of laptops and other mobile devices such as PDAs and smartphones, this data is exposed to an increasing number of threats. Additionally, governments require security products to meet specific requirements, such as independent security evaluations.

Securing mobile devices within the government presents several challenges.

Prevent Unauthorized Access to Devices
As more information is being stored on devices outside the secure confines of a physically secure building where it does the most good, it becomes critical that you know who is authorized to access that information, and be able to prevent unauthorized people from accessing that same information.

Mobile Armor provides Mandatory Authentication Services on all protected devices. This service requires that any user be properly authenticated prior to any access to the device. This includes the operating system (such as Windows), and all stored data.


Secure Confidential Data
Related to unauthorized access is preventing any access to the data, even when a device has been lost or stolen. This information may include sensitive data, such as intelligence files or diplomatic intentions, and so that information must be secure wherever it resides.

Mobile Armor secures all stored data on the device with encryption. Without proper authentication no data on the device can be read, including the operating system.



Minimize User Impact of Security
The average user is not expected to be a technology professional, and while they should understand the need for security, they should not be bothered with its implementation. They need quick access to data, confident that security is taken care of.

Since Mobile Armor encrypts all data stored on the device, users are not required to remember any extra steps to secure records; they only need to be able to login to the device.



Uniform Protection for all devices
Most government departments have many different types of devices, from PCs to PDAs that are both used by various employees. The security provided across all these devices must be the same, both to assure complete protection as well as to minimize the impact on users of the devices.

Mobile Armor provides a uniform interface across all protected platforms, allowing an organization to standardize on a single authentication system regardless of the device being used.


Independently Evaluated
Many governments require that before security products are purchased they be evaluated against some independent criteria. These evaluations are used to measure the product against the needs of the organization and to provide assurances about the security provided by the product.
Mobile Armor utilizes FIPS approved and validated encryption algorithms, AES and 3DES, for all encryption operations. This provides the highest level of security assurance available for encryption products.[/B]


http://www.certicom.com/index.php?action=company,press_archive&view=581

[B]Mobile Armor Licenses Certicom Technology to Provide VPN Security for Mobile Devices

Integration of Certicom’s highest quality, standards-based IPSec VPN functionality into our existing solution provides a secure and trusted method to wirelessly deploy and manage services.-- Chand Vyas, Mobile Armor

Data security system enables rapid deployment and secure management of services over-the-air

MISSISSAUGA, Ontario – (April 18, 2006)–When it comes to security, managed service providers (MSP) have a tall order: rapid deployment, multiple platform support, easy and secure management of services and upgrades to thousands of devices. Certicom Corp. (TSX: CIC) announced today that Mobile Armor is using Certicom technology to expand its wireless suite of security products to include IPSec for virtual private network (VPN) connectivity that meets the needs of MSPs.

"Mobile Armor provides the 'best of breed' mobile security solution for protecting critical data and information on mobile devices, laptops, and desktops," said Chand Vyas, chairman and CEO of Mobile Armor. "Integration of Certicom's highest quality, standards-based IPSec VPN functionality into our existing solution provides a secure and trusted method to wirelessly deploy and manage services."

Relying on Certicom's experience in developing security for resource-constrained environments, Mobile Armor was able to integrate a standards-based VPN client that is about one-tenth the size of the desktop version but with equivalent functionality. The Mobile Armor solution, with Certicom's VPN technology, provides the tools required to secure the enterprise, including cross-platform centralized management and reporting; data and network protection; and compliance and remediation. [U]Mobile Armor's next-generation technology security solution currently ensures the data integrity of the U.S. Department of Defense, small to large enterprises and MSPs.[/U]

"By working with Certicom, Mobile Armor is able to accelerate its time to market with secure VPN connections that support leading platforms and gateways," said Ian McKinnon, Certicom's president and CEO. "Mobile Armor's solution offers mobile service providers the means to safely manage and deliver services 'over the air' with unparalleled security."

Under the terms of the agreement, Mobile Armor will pay a one-time license fee, professional services fees and royalties on a quarterly basis, on deployment of products.

About Mobile Armor
Privately held, Mobile Armor is a St. Louis based leading provider of Enterprise Mobile Data Security (EMDS™). Mobile Armor develops and markets the next-generation software suite that enables dynamic organizations to fully protect business, financial and operating information and data. Mobile Armor's solution has been certified to meet the standards and guidelines for security set by the National Institutes of Standards and Technology, an agency of the United States Government. Visit www.mobilearmor.com

About Certicom
Certicom protects the value of your content, software and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com

Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.




AND THIS.....


http://www.investorshub.com/boards/read_msg.asp?message_id=16960428


Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.