Mobile Security

Person with PDA handheld device.

Image via Wikipedia

When people think of mobile security, they usually think of encryption for their smartphones, tablet computers such as the BlackBerry PlayBook or other wireless devices. Or they think of a remote “wipe” capability that can render any lost device blank of any data if some unauthorized party did in fact try to enter the device illegally. These wireless solutions are all state-of-the-art thinking in the mobile security community. And many wireless equipment OEMs and third-party mobile security providers offer them.

Read More


Professional Services Center in San Antonio, TX

Network Management Centre. BT has several mana...

Image via Wikipedia

Nathan Hitchcock, NOC team lead for Aviat Networks, provides guidance for all network services professionals in the company’s network operations center during its 24×7 rotation. At the NOC, Hitchcock describes a range of customers the company services—from Internet service providers to public safety networks (government wireless) . “Our customers find value in the NOC,” he says.

“It’s a natural progression that once the network is live, that the NOC just take over the managed services aspect of it,” Hitchcock says. “We provide value to our customers by helping reduce the operational expenses that are associated with managed services.”

When Aviat Networks moved its NOC to San Antonio, Texas, many backbone infrastructure and wireless security improvements were made, according to Hitchcock. And all the technical knowledge was transferred from Raleigh, N.C. He sums up the Aviat Networks’ network services value proposition as: a multi-disciplinary team that provides managed services to meet the clients’ needs.

Read More


Mobile Security Requires More Than Secure Wireless Devices

Person with PDA handheld device.

Image via Wikipedia

When people think of mobile security, they usually think of encryption for their smartphones, tablet computers such as the BlackBerry PlayBook or other wireless devices. Or they think of a remote “wipe” capability that can render any lost device blank of any data if some unauthorized party did in fact try to enter the device illegally. These wireless solutions are all state-of-the-art thinking in the mobile security community. And many wireless equipment OEMs and third-party mobile security providers offer them.

But they only protect the data on the devices. They only protect so-called “data at rest” once it’s been downloaded onto the iPhone or iPad. They don’t speak to the need to cover “data in motion” as it is transmitted over the air. Some parts of the over the air journey are protected by infrastructure in the form of Wi-Fi and GSM. One is notoriously subject to human failing to enable security and the other has been broken for sometime. And then there is wireless security for backhaul. In this area, there has not even been an industry standard or de facto standard established. And most microwave solutions providers don’t even offer options for wireless security on the backhaul.

Fortunately, this is not the case across the board. Strong Security on the Eclipse Packet Node microwave radio platform offers three-way protection for mobile backhaul security: secure management, payload encryption and integrated RADIUS capability. Read the embedded overview document in full-screen mode for more details:

Read More


Subscribe to our newsletter