Overview:
Collectively speaking, wireless security represents technologies and solutions designed to prevent unauthorized access or information damage for computers connected to wireless networks.
https://www.reportscorner.com/reports/37807/Wireless-Security-Companies-and-Solutions-2014/
3. Brief Summary
Brief Summary
Overview:
Collectively speaking, wireless security represents technologies
and solutions designed to prevent unauthorized access or
information damage for computers connected to wireless
networks. Increasingly, wireless security is targeted to the
emerging needs of the handheld wireless ecosystem, which
includes wireless tablets, smartphones, and other devices. These
devices typically rely upon an operating system that is optimized
and/or integrated with mobile communications, content,
applications, and commerce.
Within the enterprise mobility market, chief security concerns are
driven by policy decision and end-user behavior associated with
the Bring Your Own Device (BYOD) trend and the need for
corporations to execute a mobile device management plan.
www.reportscorner.com
Reports Corner
4. Brief Summary
Brief Summary
Complications intensify as enterprise deals with third-party
applications running on the same devices as corporate devices.
This report evaluates wireless security technologies, company
offerings, and solutions. The report analyzes wireless security for
different business models, analyzes key players and solutions
within the wireless security industry. The report also presents a
future outlook for wireless security based on important
technologies and solution trending and anticipated developments.
Target Audience:
• Mobile network operators
• Mobile application developers
• Wireless device manufacturers
• Enterprise mobility management
• Wireless security application developers
www.reportscorner.com
Reports Corner
5. Brief Summary
Brief Summary
• Wireless security management companies
Report Benefits:
• SWOT analysis of security companies/solutions
• Analysis of wireless security trends and industry outlook
• Assessment of companies and solutions for wireless security
• Evaluation of wireless security technologies, protocols,
challenges, and types
• Evaluation of wireless security requirements for different levels
of business models
Companies in Report:
• AirPatrol
• AirTight Networks
• Apple
• AT&T
• Blue Coat
• Cisco
www.reportscorner.com
Reports Corner
6. Brief Summary
Brief Summary
• Enterasys Networks
• Ericsson
• Google
• Hewlett Packard
• IBM
• Juniper Networks
• Microsoft
• Nokia
• RIM
• Symantec
• Verizon Business
www.reportscorner.com
Reports Corner
7. Table of Contents
Table of Contents
OVERVIEW 2
KEY BENEFITS 2
TARGET AUDIENCE 2
TABLE OF CONTENTS 2
OVERVIEW OF WIRELESS TECHNOLOGY 7
WIRELESS NETWORK ADVANTAGES 7
Popularity 7
Mobility 7
Ease of Deployment 8
WIRELESS NETWORK THREATS 8
WIRELESS TECHNOLOGIES 9
Wireless LANs 10
Ad Hoc Networks 10
Wireless Devices 11
www.reportscorner.com
Reports Corner
8. Table of Contents
Table of Contents
Mobile Phones 11
PDAs 12
Palm 12
PocketPC 12
Other Mobile Devices 13
WIRELESS LAN 13
Security Features of 802.11 Wireless LANs 14
Security Requirements and Threats 14
Passive Attack 14
Eavesdropping 14
Traffic analysis 14
Active Attack 15
Masquerading 15
Replay 15
Message modification 15
www.reportscorner.com
Reports Corner
9. Table of Contents
Table of Contents
Denial-of-service 15
Loss of Confidentiality 15
Loss of Integrity 16
Loss of Network Availability 16
WIRELESS PERSONAL AREA NETWORKS 16
Bluetooth Security Features 17
Security Requirements and Threats 18
Loss of Confidentiality 18
Loss of Integrity 19
Loss of Availability 19
MOBILE DEVICES 19
Mobile Device Requirements and Threats 20
Loss and theft 20
Disposal 20
Malware 20
www.reportscorner.com
Reports Corner
10. Table of Contents
Table of Contents
Spam 21
Private ownership 21
TELECOM MOBILE COMMUNICATIONS 21
1st generation (1G) 21
2nd generation (2G) 22
SIM 24
Speech Coding 24
Authentications and Security in GSM networks 24
WAP (Wireless Applicant Protocol) 25
3rd generation (3G) 25
Applications in 3G system 25
4th Generation (4G) 26
Applications and Services of 4G system 27
Tele Presence 27
Information Access 27
www.reportscorner.com
Reports Corner
11. Table of Contents
Table of Contents
Inter-Machine Communication 27
Intelligent Shopping 27
Location-Based Services 27
Globalization of Products 27
Communicating Appliances 28
Telecom Mobile Security 28
GSM security 28
UMTS security 29
WAP SECURITY 29
MOBILE CLOUD 30
Mobile Cloud Characteristics 30
On-demand self service 30
Broad network access 30
Resource pooling 30
Mobile Cloud Enabling Technologies 31
www.reportscorner.com
Reports Corner
12. Table of Contents
Table of Contents
4G 31
HTML5 and CSS3 31
Hypervisor 31
Cloudlets 31
Web 4.0 32
Mobile Cloud Service Models 32
Software as a Service (SaaS) 32
Platform as a Service (PaaS) 32
Infrastructure as a Service (IaaS) 32
Monitoring-as-a-Service (MaaS) 32
Mobile Cloud Platforms 33
Smart phones 33
Tablets 34
Mobile Cloud Deployment 34
Private Cloud 34
www.reportscorner.com
Reports Corner
13. Table of Contents
Table of Contents
Community Cloud 34
Public Cloud 34
Hybrid Cloud 34
Mobile Cloud Challenges 35
Resource poverty 35
Data storage capacity and processing power: 35
Division of application services 35
Absence of standards 36
Access Schemes 37
Security 37
WIRELESS SECURITY COMPANIES AND SOLUTIONS 38
ENTERASYS NETWORKS 38
Enterasys Networks Security Solutions 38
Dynamic Intrusion Response Solution 38
Secure Open Convergence Solution 38
www.reportscorner.com
Reports Corner
16. Table of Contents
Table of Contents
Proactive Application Monitoring 50
Enhanced Data center physical security 50
Enhanced Data Transfer Protection 51
Disaster Recover and the Cloud 51
www.reportscorner.com
Reports Corner
17. For more information
For more information
For more information please visit our website
https://www.reportscorner.com/reports/37807/Wireless-Security-Companies-andSolutions-2014/
www.reportscorner.com
Reports Corner