Enterprise Mobile Security with Bluetooth Smart Authentication

| December 1, 2015

article image
Bluetooth Smart authentication is here! For businesses and organizations, public key infrastructure (PKI) allows employees to access sensitive networks and information using smart cards or USB tokens. However, many of today's mobile devices don’t have embedded readers or USB slots for easy-to-use PKI security. Gemalto’s SafeNet Bluetooth Smart solution combines the unparalleled security of PKI with the anywhere, anytime convenience of  mobile.

Spotlight

Amtex Systems

Amtex provides high-quality end-to-end software solutions across industries through unique models and methodologies, to deliver time, cost, quality and full-service advantages best-of breed in nature. Amtex assists clients in making informed business decisions through high-impact insight, advice, and research. An international network of industry experts enables us to carry out global and country-specific projects.

OTHER ARTICLES

As Edge Applications Multiply, OpenInfra Community Delivers StarlingX 5.0, Offering Cloud Infrastructure Stack for 5G, IoT

Article | June 2, 2021

StarlingX—the open source edge computing and IoT cloud platform optimized for low-latency and high-performance applications—is available in its 5.0 release today. StarlingX combines Ceph, OpenStack, Kubernetes and more to create a full-featured cloud software stack that provides everything carriers and enterprises need to deploy an edge cloud on a few servers or hundreds of them.

Read More

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Storage made simple for hybrid multicloud: the new IBM FlashSystem family

Article | February 12, 2020

In part one of this blog post series, we discussed IBM’s approach for delivering innovation while simplifying your storage infrastructure, reducing complexity, and cutting costs. Now let’s take a closer look at the details of the new IBM FlashSystem family, a single platform designed to simplify your storage infrastructure, reduce complexity and cut costs, while continuing to deliver extensive innovation for your enterprise class storage solutions and your hybrid multicloud environments.

Read More

How to backup hyperconverged infrastructure

Article | May 4, 2020

Enterprises running hypervisors on hyper-converged infrastructure (HCI) systems typically have backup options available to them that are not available to those running on generic hardware. Such customers may also have additional backup challenges depending on the HCI vendor and hypervisor they have chosen. Let’s take a look.

Read More

Spotlight

Amtex Systems

Amtex provides high-quality end-to-end software solutions across industries through unique models and methodologies, to deliver time, cost, quality and full-service advantages best-of breed in nature. Amtex assists clients in making informed business decisions through high-impact insight, advice, and research. An international network of industry experts enables us to carry out global and country-specific projects.

Events