RSA® CONFERENCE, SAN JOSE, Calif.— RSA Security Inc. (Nasdaq: RS
AS), the most trusted name in e-security®, today announced that its RS
A BSAFE® Micro Edition software has been selected by PalmSource, In
c., the Palm OS subsidiary of Palm, Inc. (Nasdaq: PALM) and a leading pr
ovider of mobile computing operating system software, to secure Palm
OS® 5. By selecting RSA Security as its strategic e-security provider, Pa
lmSource, Inc. is designing Palm OS 5 to maximize data integrity and pri
vacy for transactions conducted Palm Powered™ handheld and mobile
Palm OS 5 combined with RSA Security’s strong encryption and user aut
hentication capabilities helps mobile users realize the trusted e-busines
Palm Encryption: RSA BSAFE®
Palm Authentication: RSA SecurID®
BCESA (BlackBerry Certified Enterprise Sales Associate, BCESA40 in
full) is a BlackBerry Certification for professional users of RIM
(Research In Motion) BlackBerry wireless e-mail devices.
The Certification requires the user to pass several exams relating to the
BlackBerry Device, all its functions including Desktop software and
providing technical support to Customers of BlackBerry Devices.
The BCESA, BlackBerry Certified Enterprise Sales Associate
qualification, is the first of three levels of professional BlackBerry
BCTA (BlackBerry Certified Technical Associate)
BlackBerry Certified Support Associate T2
The BlackBerry Technical Certifications available are:
BlackBerry Certified Enterprise Server Consultant (BCESC)
BlackBerry Certified Server Support Technician (BCSST)
BlackBerry Certified Support Technician (BCST)
Multiple levels of encryption. To enhance communication privacy and
authentication, Windows Mobile offers several layers of encryption:
- SSL channel encryption. SSL encrypts data transmitted between the
device (including storage cards) and server, over-the-air or through a
- S/MIME support. Secure/Multi-purpose Internet Mail Extensions
(S/MIME) provides additional protection features for e-mail messages,
whether in transit between device and server or at rest. S/MIME uses an
authentication process which helps verify that messages were not
tampered with en route.
- Wi-Fi encryption. Windows Mobile supports the Wireless Protected
Access (both WPA and WPA2) and Wired Equivalent Privacy (WEP)
encryption standards for use with 802.11a/b/g wireless LANs.
- Storage card encryption. Windows Mobile 6 supports 128-bit AES
encryption for data stored on removable storage cards.
Symbian introduced capabilities and a Platform Security framework. To
access certain APIs, developers have to sign their application with a
digital signature. Basic capabilities are user-grantable and developers
can self-sign them, while more advanced capabilities require
certification and signing via theSymbian Signed program, which uses
independent 'test houses' and phone manufacturers for approval. For
example, file writing is a user-grantable capability while access to
Multimedia Device Drivers require phone manufacturer approval. A TC
TrustCenter ACS Publisher ID certificate is required by the developer for
iPhone 3GS offers hardware-based encryption. iPhone 3GS hardware
encryption uses AES 256 bit encoding to protect all data on the device.
Encryption is always enabled, and cannot be disabled by users.
In addition to enabling secure access to existing VPN environments,
iPhone offers proven methods for user authentication. Authentication
via standard x.509 digital certificates provides users with streamlined
access to company resources and a viable alternative to using
iPhone supports WPA2 Enterprise to provide authenticated access to
your enterprise wireless network. WPA2 Enterprise uses 128-bit AES
encryption, giving users the highest level of assurance that their data
will remain protected when they send and receive communications over
a Wi-Fi network connection. And with support for 802.1x, iPhone can be
integrated into a broad range of RADIUS authentication environments.
The Advanced Encryption Standard-Cipher-based Message
Authentication Code-Pseudo-Random Function-128 (AES-CMAC-
PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)
We compared the environment of those OS, such as the Dataflow,
Security, Application and user-friendly.
Dataflow Security Application Price User-friendly
Palm OS 5 High Low $2000 to High
BlackBerr 8 Medium Medium $2000 to Low
y OS $4000
Symbian 7 Medium High $2000 to Medium
iPhone 8 High High $4500 to High
Window 7 High High $2000 to High
Google 8 Medium Medium $2000 to High
Additionally, data backed up in iTunes to a user’s computer can be
encrypted. When an encrypted configuration profile is stored on the
user’s device, this capability is enforced automatically. And to further
protect application data, developers have access to APIs that enable
them to encrypt data within their own application data stores.
For enterprise environments in which a two-factor token is a
requirement, iPhone integrates with RSASecurID and CRYPTOCard.
Additionally, certificate authentication enables iPhone to take advantage
of VPN On Demand, making the VPN authentication process transparent
while still providing strong, credentialed access to network services.