Plam OS
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Plam OS

on

  • 561 views

 

Statistics

Views

Total Views
561
Views on SlideShare
561
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Plam OS Document Transcript

  • 1. Plam OS RSA® CONFERENCE, SAN JOSE, Calif.— RSA Security Inc. (Nasdaq: RS AS), the most trusted name in e-security®, today announced that its RS A BSAFE® Micro Edition software has been selected by PalmSource, In c., the Palm OS subsidiary of Palm, Inc. (Nasdaq: PALM) and a leading pr ovider of mobile computing operating system software, to secure Palm OS® 5. By selecting RSA Security as its strategic e-security provider, Pa lmSource, Inc. is designing Palm OS 5 to maximize data integrity and pri vacy for transactions conducted Palm Powered™ handheld and mobile devices. Palm OS 5 combined with RSA Security’s strong encryption and user aut hentication capabilities helps mobile users realize the trusted e-busines s process Palm Encryption: RSA BSAFE® Palm Authentication: RSA SecurID® Blackberry OS BCESA (BlackBerry Certified Enterprise Sales Associate, BCESA40 in full) is a BlackBerry Certification for professional users of RIM (Research In Motion) BlackBerry wireless e-mail devices. The Certification requires the user to pass several exams relating to the BlackBerry Device, all its functions including Desktop software and providing technical support to Customers of BlackBerry Devices. The BCESA, BlackBerry Certified Enterprise Sales Associate qualification, is the first of three levels of professional BlackBerry Certification. BCTA (BlackBerry Certified Technical Associate) BlackBerry Certified Support Associate T2 The BlackBerry Technical Certifications available are:
  • 2. BlackBerry Certified Enterprise Server Consultant (BCESC) BlackBerry Certified Server Support Technician (BCSST) BlackBerry Certified Support Technician (BCST) Window Mobile Multiple levels of encryption. To enhance communication privacy and authentication, Windows Mobile offers several layers of encryption: - SSL channel encryption. SSL encrypts data transmitted between the device (including storage cards) and server, over-the-air or through a wired connection. - S/MIME support. Secure/Multi-purpose Internet Mail Extensions (S/MIME) provides additional protection features for e-mail messages, whether in transit between device and server or at rest. S/MIME uses an authentication process which helps verify that messages were not tampered with en route. - Wi-Fi encryption. Windows Mobile supports the Wireless Protected Access (both WPA and WPA2) and Wired Equivalent Privacy (WEP) encryption standards for use with 802.11a/b/g wireless LANs. - Storage card encryption. Windows Mobile 6 supports 128-bit AES encryption for data stored on removable storage cards. Symbian OS Symbian introduced capabilities and a Platform Security framework. To access certain APIs, developers have to sign their application with a digital signature. Basic capabilities are user-grantable and developers can self-sign them, while more advanced capabilities require certification and signing via theSymbian Signed program, which uses independent 'test houses' and phone manufacturers for approval. For example, file writing is a user-grantable capability while access to Multimedia Device Drivers require phone manufacturer approval. A TC TrustCenter ACS Publisher ID certificate is required by the developer for signing applications.
  • 3. iPhone OS Encryption iPhone 3GS offers hardware-based encryption. iPhone 3GS hardware encryption uses AES 256 bit encoding to protect all data on the device. Encryption is always enabled, and cannot be disabled by users. Authentication In addition to enabling secure access to existing VPN environments, iPhone offers proven methods for user authentication. Authentication via standard x.509 digital certificates provides users with streamlined access to company resources and a viable alternative to using hardware-based tokens. WPA/WPA2 iPhone supports WPA2 Enterprise to provide authenticated access to your enterprise wireless network. WPA2 Enterprise uses 128-bit AES encryption, giving users the highest level of assurance that their data will remain protected when they send and receive communications over a Wi-Fi network connection. And with support for 802.1x, iPhone can be integrated into a broad range of RADIUS authentication environments. Google Android RFC 4615: The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC- PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)
  • 4. Analysis We compared the environment of those OS, such as the Dataflow, Security, Application and user-friendly. Dataflow Security Application Price User-friendly (around) Palm OS 5 High Low $2000 to High $5000 BlackBerr 8 Medium Medium $2000 to Low y OS $4000 Symbian 7 Medium High $2000 to Medium $4000 iPhone 8 High High $4500 to High OS $6000 Window 7 High High $2000 to High Mobile $4000 OS Google 8 Medium Medium $2000 to High Android $5000 ------------------------------------------------------------------------------------------------------- Additionally, data backed up in iTunes to a user’s computer can be encrypted. When an encrypted configuration profile is stored on the user’s device, this capability is enforced automatically. And to further protect application data, developers have access to APIs that enable them to encrypt data within their own application data stores. For enterprise environments in which a two-factor token is a requirement, iPhone integrates with RSASecurID and CRYPTOCard. Additionally, certificate authentication enables iPhone to take advantage of VPN On Demand, making the VPN authentication process transparent while still providing strong, credentialed access to network services.