|
|
|
 |
 |
 |
 |
Data
Security with MOBILEmanager®
MOBILEmanager® Supplies
Five Highly Effective Encoding Technologies:
3DES
Twofish
AES DES
Blowfish
Twofish
DES
First of all, MOBILEmanager® can use existing key management to
integrate other encoding systems (that may already be in place). This
does not require additional work. Products from third companies that
not only satisfy the latest standards but are also evaluated and
certified as per ITSEC or CC can also be integrated easily. Beyond
this, it can utilise encoding methods coded with hardware (such as
PCMCIA, PCI or ISA cards or USB bars).
Finally, MOBILEmanager® supports common VPN applications
and is compatible with modern standards such as IPSec and common
VPNClients meeting maximum security requirements.
|
|
Five-Fold
Access
Security:
MOBILEmanager® offers a wide range of mechanisms for user and
application authentification and authorisation. The combination of
these techniques delivers a security system satisfying even the highest
requirements. MOBILEmanager® makes sure that your sensitive
corporate data can be securely transmitted by mobile radio.
1. Checking serial numbers
The server checks the serial numbers of the terminal dialling in based
upon a list of explicitly cleared or blocked numbers. This means that
you can be sure that stolen notebooks can't access the network.
2. IMEI (International Mobile
Equipment Identity):
The unambiguous equipment number burned onto every mobile phone can
also be explicitly cleared or blocked.
3. CLI Check (Calling Line Identity):
Only cleared subscriber call numbers are authorised for access.
4. Application Server and Application
Firewall:
The application server's IP address and an application's port numbers
can be explicitly cleared or blocked, allowing you to check individual
application servers and applications.
5. RADIUS (optional) (Remote
Authentification Dial In User Service):
Access is protected by password with a log-in/password pair, meaning
only authorised users have access. |
|
|