Wireless Security Companies and Solutions 2014

Wireless Security Companies and Solutions 2014

Mind Commerce, Date of Publication: Feb 17, 2014, 52 Pages
US$1,995.00
MC4785
Collectively speaking, wireless security represents technologies and solutions designed to prevent unauthorized access or information damage for computers connected to wireless networks. Increasingly, wireless security is targeted to the emerging needs of the handheld wireless ecosystem, which includes wireless tablets, smartphones, and other devices. These devices typically rely upon an operating system that is optimized and/or integrated with mobile communications, content, applications, and commerce.
 
Within the enterprise mobility market, chief security concerns are driven by policy decision and end-user behavior associated with the Bring Your Own Device (BYOD) trend and the need for corporations to execute a mobile device management plan. Complications intensify as enterprise deals with third-party applications running on the same devices as corporate devices.
 
This report evaluates wireless security technologies, company offerings, and solutions. The report analyzes wireless security for different business models, analyzes key players and solutions within the wireless security industry. The report also presents a future outlook for wireless security based on important technologies and solution trending and anticipated developments.
 
Target Audience:
  • Mobile network operators
  • Mobile application developers
  • Wireless device manufacturers
  • Enterprise mobility management
  • Wireless security application developers
  • Wireless security management companies
 
Report Benefits:
  • SWOT analysis of security companies/solutions
  • Analysis of wireless security trends and industry outlook
  • Assessment of companies and solutions for wireless security
  • Evaluation of wireless security technologies, protocols, challenges, and types
  • Evaluation of wireless security requirements for different levels of business models
 
Companies in Report:
  • AirPatrol
  • AirTight Networks
  • Apple
  • AT&T
  • Blue Coat
  • Cisco
  • Enterasys Networks
  • Ericsson
  • Google
  • Hewlett Packard
  • IBM
  • Juniper Networks
  • Microsoft
  • Nokia
  • RIM
  • Symantec
  • Verizon Business


TABLE OF CONTENTS

OVERVIEW
KEY BENEFITS 2
TARGET AUDIENCE 2
TABLE OF CONTENTS 2
 
OVERVIEW OF WIRELESS TECHNOLOGY
 
WIRELESS NETWORK ADVANTAGES
Popularity 7
Mobility 7
Ease of Deployment 8
 
WIRELESS NETWORK THREATS
 
WIRELESS TECHNOLOGIES
Wireless LANs 10
Ad Hoc Networks 10
Wireless Devices 11
Mobile Phones 11
PDAs 12
Palm 12
PocketPC 12
Other Mobile Devices 13
WIRELESS LAN 13
Security Features of 802.11 Wireless LANs 14
Security Requirements and Threats  14
Passive Attack 14
Eavesdropping 14
Traffic analysis 14
Active Attack 15
Masquerading 15
Replay 15
Message modification 15
Denial-of-service 15
Loss of Confidentiality 15
Loss of Integrity 16
Loss of Network Availability 16
 
WIRELESS PERSONAL AREA NETWORKS
Bluetooth Security Features 17
Security Requirements and Threats  18
Loss of Confidentiality 18
Loss of Integrity 19
Loss of Availability 19
 
MOBILE DEVICES
Mobile Device Requirements and Threats 20
Loss and theft 20
Disposal 20
Malware 20
Spam 21
Private ownership 21
 
TELECOM MOBILE COMMUNICATIONS
1st generation (1G)  21
2nd generation (2G) 22
SIM 24
Speech Coding 24
Authentications and Security in GSM networks 24
WAP (Wireless Applicant Protocol) 25
3rd generation (3G) 25
Applications in 3G system 25
4th Generation (4G) 26
Applications and Services of 4G system 27
Tele Presence 27
Information Access  27
Inter-Machine Communication 27
Intelligent Shopping 27
Location-Based Services 27
Globalization of Products 27
Communicating Appliances  28
Telecom Mobile Security 28
GSM security 28
UMTS security 29
WAP SECURITY 29
MOBILE CLOUD 30
Mobile Cloud Characteristics 30
On-demand self service 30
Broad network access 30
Resource pooling 30
Mobile Cloud Enabling Technologies 31
4G 31
HTML5 and CSS3 31
Hypervisor 31
Cloudlets 31
Web 4.0 32
Mobile Cloud Service Models 32
Software as a Service (SaaS) 32
Platform as a Service (PaaS) 32
Infrastructure as a Service (IaaS) 32
Monitoring-as-a-Service (MaaS) 32
Mobile Cloud Platforms 33
Smart phones 33
Tablets 34
Mobile Cloud Deployment 34
Private Cloud 34
Community Cloud 34
Public Cloud 34
Hybrid Cloud 34
Mobile Cloud Challenges 35
Resource poverty 35
Data storage capacity and processing power: 35
Division of application services 35
Absence of standards 36
Access Schemes 37
Security 37
 
WIRELESS SECURITY COMPANIES AND SOLUTIONS
 
ENTERASYS NETWORKS
Enterasys Networks Security Solutions 38
Dynamic Intrusion Response Solution 38
Secure Open Convergence Solution 38
Acceptable Use Policy Solution 38
SWOT Analysis 38
AIRTIGHT NETWORKS 40
AirTight Networks Security Solutions 40
Intelligent Edge Wi-Fi 40
Top-ranked Security 40
AirTight Networks' SpectraGuard 40
SWOT Analysis 41
VERIZON BUSINESS  41
VeriZon Wireless Security Solutions for Retail 41
SWOT Analysis 42
AIRPATROL  42
AirPatrol Security Solution 43
SWOT Analysis 43
BLUE COAT  44
Blue Coat Security Solution 44
SWOT Analysis 45
CISCO 46
Cisco Wireless Security Solution 46
SWOT Analysis 46
SYMANTEC  47
Symantec Wireless Security Solution 47
SWOT Analysis 47
JUNIPER NETWORKS 48
Juniper Networks Wireless Security Solution 48
SWOT Analysis 49
 
WIRELESS SECURITY FUTURE TRENDS
WPA2 50
 
LOCATION AND SITUATIONAL AWARENESS
 
MORE PROTECTION FOR CLOUD
Proactive Application Monitoring 50
Enhanced Data center physical security 50
Enhanced Data Transfer Protection  51
Disaster Recover and the Cloud 51
 
Date of Publication:
Feb 17, 2014
File Format:
PDF via E-mail
Number of Pages:
52 Pages
Type the characters you see in the picture above.