Thursday, 02 February 2012 12:30

Mobile Security Solutions

Written by

Mobile Security Solutions cover a wide range of topics related to the challenges posed by the use of mobile devices in an enterprise or government context.

Mobile devices such as smart phones, tablets, phablet, but also portable gaming devices, payment and other functional terminals and many other portable devices using a wireless network. The wireless protocals being used can vary and are usually complementary : GSM, 2-4 and even 5G, Wifi, Bluetooth, NFC, RFID, Zigbee, ... 
Mobile devices are typically running common operations systems such as Android or derived forms of Android such as Wearable Android, IoS, Windows Mobile, Blackberry, Symbian and some older OS-es in many versions and variations. 

Part of the complexity of the challenges with Mobile devices is the fact that most individuals have a preference for a device based upon taste, budget, functionality and appreciated ease of use, amongst many other parameters. Enterprises are trying to cope with this by setting up a Mobile Device Management program, either disallowing any devices on corporate networks which have not been authorized by the corporate IT / Security divisions. Others have set up platforms allowing to control the business data being hosted on the mobile devices. 

LSEC has a wide based of expertise and experts in the domain, from ensuring protection from the embedded layers to the level of avoiding reverse engineering. 

Some activities being held on the topic : 

End Point Protection, a shift towards End Point Intelligence : http://www.leadersinsecurity.org/events/icalrepeat.detail/2014/06/23/71/-/-.html

Mobile Apps - Major Security and Privacy Developments - 2014 and beyond : http://www.leadersinsecurity.org/events/icalrepeat.detail/2014/06/23/71/-/-.html

 

Upcoming Mobile Security Events and Seminars : 

 

 

Other relevant documentation that can be found. 

 

 

Some of the LSEC Expert Members on Mobile Security : 

 

More in this category: « Mobile Security Cloud Security »

Related Expertises

Related Experts

Related Documents

Partners

  • 2017-01-19_11-12-42.png
  • ACDCLogo_v4_Verde_150x79.png
  • agoria.png
  • APWGEU.png
  • arc_logo.png
  • b-hive.png
  • beltug.jpg
  • bronzecluster.jpg
  • centrodecyberseguridad.png
  • computable-logo-be-small.png
  • csc.png
  • dgconnect.jpg
  • dspvalley.jpg
  • fisc.png
  • heliview.png
  • infosecurity_belgium.png
  • isaca.png
  • jaarbeurs.png
  • logo-ecso.gif
  • nsmc.png
  • polescs.jpg
  • sirris.png
  • stopthinkconnect.png
  • teletrust-logo.gif
  • UKCSFlogo.png
  • VLAIO.png
  • voka.png

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

 

LSEC for enterprise & government

lsec-gov

 

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41