Entrust helps iPhone to become a secure remote office
In November 2008, an American marketing agency JD Power and Associates named the Apple iPhone number one among smartphones, fully satisfying the needs of corporate clients. According to analysts, a smartphone is able to replace a laptop, a handheld personal computer and other electronic devices, ensuring the continuity of the business process.
Companies Entrust was able to do the job for smartphone users the same security as on an office computer or laptop. You can pass a rigorous authentication when accessing a corporate network based on the X.509 digital certificate format via the built-client IPSec VPN, on a hardware token or password. iPhone also supports WPA2 Enterprise authentication with a digital certificate format 802.1X to ensure the safety of Wi-Fi-communications.
In addition to secure access to corporate information, iPhone owners can make the external secure transaction using one-time passwords and the grid method (eGrid). One-time passwords to authenticate the user receives in the form of SMS-messages, using voice or e-mail and spreadsheet eGrid codes placed directly in the smartphone. These authentication methods are implemented using a software platform Entrust IdentityGuard.
Companies Entrust was able to do the job for smartphone users the same security as on an office computer or laptop. You can pass a rigorous authentication when accessing a corporate network based on the X.509 digital certificate format via the built-client IPSec VPN, on a hardware token or password. iPhone also supports WPA2 Enterprise authentication with a digital certificate format 802.1X to ensure the safety of Wi-Fi-communications.
In addition to secure access to corporate information, iPhone owners can make the external secure transaction using one-time passwords and the grid method (eGrid). One-time passwords to authenticate the user receives in the form of SMS-messages, using voice or e-mail and spreadsheet eGrid codes placed directly in the smartphone. These authentication methods are implemented using a software platform Entrust IdentityGuard.
No comments: