adisoft systems GmbH & Co. Kg
  HOME    |    SITEMAP    |    IMPRINT    |    DEUTSCH  
  ProductsCompanyPartnerNewsContact  
     
   
 
MOBILEmanager®
Data Security
Areas of Application
Economic Viability
Auto. network dialing
Technical Details
Look at the Flashfilm
Request Information
Download Client
Download Server
Download Administration


 
Intel, the Intel Inside Logo, Intel
Centrino and the Intel Centrino Logo
are trademarks or registered trademarks
of Intel Corporation or its subsidiaries
in the United States and other countries.
 
MOBILEmanager
Data Security with MOBILEmanager®

MOBILEmanager® Supplies Five Highly Effective Encoding Technologies:

3DES
Twofish
AES DES
Blowfish
Twofish
DES


First of all, MOBILEmanager® can use existing key management to integrate other encoding systems (that may already be in place). This does not require additional work. Products from third companies that not only satisfy the latest standards but are also evaluated and certified as per ITSEC or CC can also be integrated easily. Beyond this, it can utilise encoding methods coded with hardware (such as PCMCIA, PCI or ISA cards or USB bars).
 
Finally, MOBILEmanager® supports common VPN applications and is compatible with modern standards such as IPSec and common VPNClients meeting maximum security requirements.

  Five-Fold Access Security:

MOBILEmanager® offers a wide range of mechanisms for user and application authentification and authorisation. The combination of these techniques delivers a security system satisfying even the highest requirements. MOBILEmanager® makes sure that your sensitive corporate data can be securely transmitted by mobile radio.

1. Checking serial numbers
The server checks the serial numbers of the terminal dialling in based upon a list of explicitly cleared or blocked numbers. This means that you can be sure that stolen notebooks can't access the network.

2. IMEI (International Mobile Equipment Identity):
The unambiguous equipment number burned onto every mobile phone can also be explicitly cleared or blocked.

3. CLI Check (Calling Line Identity):
Only cleared subscriber call numbers are authorised for access.

4. Application Server and Application Firewall:
The application server's IP address and an application's port numbers can be explicitly cleared or blocked, allowing you to check individual application servers and applications.

5. RADIUS (optional) (Remote Authentification Dial In User Service):
Access is protected by password with a log-in/password pair, meaning only authorised users have access.