Cover Image
市場調查報告書

無線安全性企業與解決方案

Wireless Security Companies and Solutions 2014

出版商 Mind Commerce 商品編碼 296248
出版日期 內容資訊 英文 52 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
無線安全性企業與解決方案 Wireless Security Companies and Solutions 2014
出版日期: 2014年02月01日 內容資訊: 英文 52 Pages
簡介

通稱無線安全性,是指防止對連接無線網路的電腦的非法存取,或是資訊破壞的技術及解決方案。無線安全性的對象,為無線平板電腦,智慧型手機,及其他的設備所構成,可攜式無線生態系統的新需求增加。通常這些設備依賴於最佳化、整合化行動通訊,應用及貿易用的作業系統。

本報告提供無線安全性技術、各企業的提供品及解決方案調查分析、不同的經營模式取向的無線安全性分析,及無線安全性產業上主要企業及解決方案彙整、未來展望等、為您概述為以下內容。

概要

主要的有益性

主要讀者

無線技術概要

  • 無線網路的優勢
    • 受歡迎
    • 流動性
    • 引進簡單
  • 無線網路的威脅

無線技術

  • 無線LAN
  • 個別網路
  • 無線設備
  • 行動電話
  • PDA
  • Palm
  • PocketPC
  • 其他行動裝置

無線LAN

  • 802.11無線LAN的安全性功能
  • 安全性必要條件和威脅
  • 被動的攻擊
  • 竊聽
  • 流量分析
  • 積極的攻擊
  • 詐騙
  • 再現
  • 訊息變更
  • 服務干擾(DOS)
  • 機密性的損失
  • 完全性的損失
  • 網路可用性的損失

無線個人區域網路(PAN)

  • 藍芽安全性功能
  • 安全性必要條件和威脅
  • 機密性的損失
  • 完全性的損失
  • 網路可用性的損失

行動裝置

  • 行動裝置的必要條件和威脅
  • 遺失與竊盜
  • 廢棄
  • 惡意程式
  • 垃圾郵件
  • 私有

電信業者的行動通訊

  • 第1代(1G)
  • 第2代(2G)
  • SIM
  • 速度編碼
  • GSM網路的認證及安全性
  • WAP(無線應用通訊協定)
  • 第3代(3G)
  • 3G系統的應用
  • 第4代(4G)
  • 4G系統的應用及服務
  • 遠距臨場系統
  • 資訊存取
  • 機器間通訊
  • 智慧型消費
  • 定位服務
  • 產品的全球化
  • 可通訊的電器產品
  • 電信業者的行動安全
  • GSM安全性
  • UMTS安全性

WAP安全性

行動雲端

  • 行動雲端的特徵
  • 隨選自助服務
  • 隨處網路存取
  • 資源聯營
  • 行動雲端實行技術
    • 4G
    • HTML5、CSS3
    • Hypervisor
    • Cloudlets
    • Web 4.0
  • 行動雲端服務模式
    • Software as a Service (SaaS)
    • Platform as a Service (PaaS)
    • Infrastructure as a Service (IaaS)
    • Monitoring-as-a-Service (MaaS)
  • 行動雲端平台
    • 智慧型手機
    • 平板電腦
    • 行動雲端的發展
    • 私人雲端
    • 團體雲端
    • 公共雲端
    • 混合雲端
  • 行動雲端的課題
    • 資源缺乏
    • 資料儲存容量與處理能力
    • 應用服務的分割
    • 標準的缺失
    • 存取方案
    • 安全性

無線安全性企業與解決方案

  • ENTERASYS NETWORKS
  • AIRTIGHT NETWORKS
  • VERIZON BUSINESS
  • AIRPATROL
  • BLUE COAT
  • CISCO
  • SYMANTEC
  • JUNIPER NETWORKS

無線安全性的未來趨勢

  • WPA2
  • 地理定位和情境察覺
  • 新的雲端保護
    • 事前應用監測
    • 資訊中心的物理性安全性的強化
    • 數據傳送保護的強化
    • 災害復原與雲端

圖表清單

目錄

Collectively speaking, wireless security represents technologies and solutions designed to prevent unauthorized access or information damage for computers connected to wireless networks. Increasingly, wireless security is targeted to the emerging needs of the handheld wireless ecosystem, which includes wireless tablets, smartphones, and other devices. These devices typically rely upon an operating system that is optimized and/or integrated with mobile communications, content, applications, and commerce.

Within the enterprise mobility market, chief security concerns are driven by policy decision and end-user behavior associated with the Bring Your Own Device (BYOD) trend and the need for corporations to execute a mobile device management plan. Complications intensify as enterprise deals with third-party applications running on the same devices as corporate devices.

This report evaluates wireless security technologies, company offerings, and solutions. The report analyzes wireless security for different business models, analyzes key players and solutions within the wireless security industry. The report also presents a future outlook for wireless security based on important technologies and solution trending and anticipated developments.

Target Audience:

  • Mobile network operators
  • Mobile application developers
  • Wireless device manufacturers
  • Enterprise mobility management
  • Wireless security application developers
  • Wireless security management companies

Report Benefits:

  • SWOT analysis of security companies/solutions
  • Analysis of wireless security trends and industry outlook
  • Assessment of companies and solutions for wireless security
  • Evaluation of wireless security technologies, protocols, challenges, and types
  • Evaluation of wireless security requirements for different levels of business models

Companies in Report:

  • AirPatrol
  • AirTight Networks
  • Apple
  • AT&T
  • Blue Coat
  • Cisco
  • Enterasys Networks
  • Ericsson
  • Google
  • Hewlett Packard
  • IBM
  • Juniper Networks
  • Microsoft
  • Nokia
  • RIM
  • Symantec
  • Verizon Business

Table of Contents

OVERVIEW

KEY BENEFITS

TARGET AUDIENCE

TABLE OF CONTENTS

OVERVIEW OF WIRELESS TECHNOLOGY

WIRELESS NETWORK ADVANTAGES

  • Popularity
  • Mobility
  • Ease of Deployment

WIRELESS NETWORK THREATS

WIRELESS TECHNOLOGIES

  • Wireless LANs
  • Ad Hoc Networks
  • Wireless Devices
  • Mobile Phones
  • PDAs
  • Palm
  • PocketPC
  • Other Mobile Devices

WIRELESS LAN

  • Security Features of 802.11 Wireless LANs
  • Security Requirements and Threats
  • Passive Attack
  • Eavesdropping
  • Traffic analysis
  • Active Attack
  • Masquerading
  • Replay
  • Message modification
  • Denial-of-service
  • Loss of Confidentiality
  • Loss of Integrity
  • Loss of Network Availability

WIRELESS PERSONAL AREA NETWORKS

  • Bluetooth Security Features
  • Security Requirements and Threats
  • Loss of Confidentiality
  • Loss of Integrity
  • Loss of Availability

MOBILE DEVICES

  • Mobile Device Requirements and Threats
  • Loss and theft
  • Disposal
  • Malware
  • Spam
  • Private ownership

TELECOM MOBILE COMMUNICATIONS

  • 1st generation (1G)
  • 2nd generation (2G)
  • SIM
  • Speech Coding
  • Authentications and Security in GSM networks
  • WAP (Wireless Applicant Protocol)
  • 3rd generation (3G)
  • Applications in 3G system
  • 4th Generation (4G)
  • Applications and Services of 4G system
  • Tele Presence
  • Information Access
  • Inter-Machine Communication
  • Intelligent Shopping
  • Location-Based Services
  • Globalization of Products
  • Communicating Appliances
  • Telecom Mobile Security
  • GSM security
  • UMTS security

WAP SECURITY

MOBILE CLOUD

  • Mobile Cloud Characteristics
  • On-demand self service
  • Broad network access
  • Resource pooling
  • Mobile Cloud Enabling Technologies
  • 4G
  • HTML5 and CSS3
  • Hypervisor
  • Cloudlets
  • Web 4.0
  • Mobile Cloud Service Models
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Monitoring-as-a-Service (MaaS)
  • Mobile Cloud Platforms
  • Smart phones
  • Tablets 34
  • Mobile Cloud Deployment
  • Private Cloud
  • Community Cloud
  • Public Cloud
  • Hybrid Cloud
  • Mobile Cloud Challenges
  • Resource poverty
  • Data storage capacity and processing power:
  • Division of application services
  • Absence of standards
  • Access Schemes
  • Security

WIRELESS SECURITY COMPANIES AND SOLUTIONS

ENTERASYS NETWORKS

  • Enterasys Networks Security Solutions
  • Dynamic Intrusion Response Solution
  • Secure Open Convergence Solution
  • Acceptable Use Policy Solution
  • SWOT Analysis

AIRTIGHT NETWORKS

  • AirTight Networks Security Solutions
  • Intelligent Edge Wi-Fi
  • Top-ranked Security
  • AirTight Networks' SpectraGuard
  • SWOT Analysis

VERIZON BUSINESS

  • VeriZon Wireless Security Solutions for Retail
  • SWOT Analysis

AIRPATROL

  • AirPatrol Security Solution
  • SWOT Analysis

BLUE COAT

  • Blue Coat Security Solution
  • SWOT Analysis

CISCO

  • Cisco Wireless Security Solution
  • SWOT Analysis

SYMANTEC

  • Symantec Wireless Security Solution
  • SWOT Analys

JUNIPER NETWORKS

  • Juniper Networks Wireless Security Solution
  • SWOT Analysis

WIRELESS SECURITY FUTURE TRENDS

WPA2

LOCATION AND SITUATIONAL AWARENESS

MORE PROTECTION FOR CLOUD

  • Proactive Application Monitoring
  • Enhanced Data center physical security
  • Enhanced Data Transfer Protection
  • Disaster Recover and the Cloud
Back to Top