They are all interrelated and supportive of each other. SSL relies ondigitally signed certificates provided by a trusted third-party PKIcertifying authority, which enables encrypted data channels andallows for safe user authentication for Web login scenarios.PKI ranks first in usage by 15 percent of wireless developerssurveyed, followed shortly by SSL/TLS. When the two options arecombined, PKI/SSL solutions are selected by just under a third of alldevelopers surveyed. Vying for third-place, userauthentication/password protection, WAP 2.0 security, and digitalsignatures are each selected by one out of 10 respondents.On the next page, we'll look beyond speculation and find out whatsecurity mechanisms developers are actually *using* in theirenterprises.
Page 1 of 2
Figure 4.The Question:
Which of thefollowing security mechanisms would yoube
likely to use on your wirelessapps?
Navigating Your IT Career
A career in information technology usually has its share of ups anddowns. Download this Internet.com eBook to learn where the jobs arein IT, how to negotiate a salary, and helpful advice on job security andhow to deal with a layoff.
Locking Down Your Wireless Network
Changing the default SSID or disabling SSID broadcasting are two ofthe most popular ways to help secure a wireless network, but by nomeans do they provide adequate security. Learn how to useencryption, VPNs, and basic laptop and PC security to keep yournetwork and machines safe.
Evaluating Software as a Service for Your Business
Is Software as a Service just hype, or is something really going onhere? And if there is fuel behind these flames, what's different? Whyhas a model that languished for a decade suddenly gained steam?Download this eBook to see if your company can benefit as SaaS triesto change the face of the enterprise.
The State of Storage Virtualization
Virtualization has been something of a buzzword in storage for morethan half a decade. It is defined in a variety of ways, depending onwhom you ask. So what exactly is it? And how should it beimplemented? This eBook from our editors atEnterpriseStorageForum.com and Internet.com explores some of thesecond-generation storage virtualization products from a number ofvendors and compares their approaches.
Waging the War Against Spam
Businesses spend a whopping $712 per worker, per year, in the battleagainst spam, but there doesn't seem to be any easy answers to theproblem. Download this eBook to see what your IT department can doto reduce the nuisance of spam, and for tips on how your users canhelp you fight the battle.
Page 2of 3Wireless Data Shot: Security and the Enterprise11-Dec-07http://www.devx.com/wireless/Article/22160/1763/page/1