Security for Wireless Handhelds

Similar documents
Meeting Government Security Requirements Today and Tomorrow

Certicom Security for Government Suppliers developing products to meet the US Government FIPS security requirement

Certicom Solutions Overview. protect. your content, applications and devices WITH GOVERNMENT APPROVED SECURITY

Meeting Government Security Requirements Today and Tomorrow

Fixed-Mobile Convergence: Critical Issues for Wireline and Wireless Carriers

HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

Applications using ECC. Matthew Campagna Director Certicom Research

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

ipad in Business Security Overview

Solutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

SafeGuard SecurityServer

iotrust Security Solutions

The Device Has Left the Building

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance

Citrix XenApp and XenDesktop 7.6 LTSR FIPS Sample Deployments

Axway Validation Authority Suite

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments

Internet Engineering Task Force (IETF) Request for Comments: 5756

OpenWay by Itron Security Overview

Data Model Considerations for Radar Systems

Secure Messaging Buyer s Guide

The Open Application Platform for Secure Elements.

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers

White paper. Combatant command (COCOM) next-generation security architecture

CryptoEx: Applications for Encryption and Digital Signature

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

Oracle PeopleSoft 9.2 with NetScaler for Global Server Load Balancing

Comodo Certificate Manager Software Version 5.6

Who s Protecting Your Keys? August 2018

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

RIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers

IBM Tivoli Directory Server

Mobilize with Enterprise Security and a Productive User Experience

SHA-1 to SHA-2. Migration Guide

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Cisco VPN Internal Service Module for Cisco ISR G2

The Application of Elliptic Curves Cryptography in Embedded Systems

Cisco Storage Media Encryption for Tape

Mobile Data Security Essentials for Your Changing, Growing Workforce

Technology for Innovators TM TI WIRELESS TECHNOLOGY DELIVERING ALL THE PROMISE OF 3G

white paper SMS Authentication: 10 Things to Know Before You Buy

DataLocker Enterprise

RHM Presentation. Maas 360 Mobile device management

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

VMware Cloud Operations Management Technology Consulting Services

QUANTUM SAFE PKI TRANSITIONS

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y

TransKrypt Security Server

OneBridge Mobile Data Suite

The SafeNet Security System Version 3 Overview

Simplify IP Telephony with System i. IBM System i IP Telephony

SEPARATING WORK AND PERSONAL

Moser Baer Group 25 years of excellence

Rethink Remote Access

How does your organization manage Privileged Users?

Hybrid Coax-Wireless Multimedia Home Networks Using Technology. Noam Geri, Strategic Marketing Manager

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Cloud SSL Certificate Services

Dyadic Security Enterprise Key Management

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

A roadmap to migrating the internet to quantum-safe cryptography

A comprehensive security solution for enhanced mobility and productivity

XenApp, XenDesktop and XenMobile Integration

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

FIPS Security Policy

The Most Important Facts in a Nutshell Content Security User Interface Security Infrastructure Security In Detail...

WHITE PAPER. Good Mobile Intranet Technical Overview

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

VMware, SQL Server and Encrypting Private Data Townsend Security

What s new in Enterprise Alert 2017

PKI Credentialing Handbook

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Securing Mainframe File Transfers and TN3270

Over-the-Air Provisioning for WiMAX Operators

Next Level Remote Access

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Developing Core Software Technologies for TI s OMAP Platform

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

Getting to Grips with Public Key Infrastructure (PKI)

Training. Global Training Programs

Certeon s acelera Virtual Appliance for Acceleration

DATACENTER SERVICES DATACENTER

KeyOne. Certification Authority

Design and deliver cloud-based apps and data for flexible, on-demand IT

MOVE TO A FLEXIBLE IT MODEL ENTERPRISE DATA CENTER SOLUTIONS.

HP ProLiant DL580 G5. HP ProLiant BL680c G5. IBM p570 POWER6. Fujitsu Siemens PRIMERGY RX600 S4. Egenera BladeFrame PB400003R.

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Transcription:

wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market securing the wireless world

security for wireless handhelds Incorporating security is no longer an option it s mission critical. Corporations and government organizations are demanding it. Businesses operating at warp-speed are providing their employees with a range of devices and applications to enable them to easily access and share information from anywhere in the world. As more organizations embrace this multitude of new devices, IT departments must find cost-effective solutions that work within their established security policies and network infrastructure to enable secure, anytime, anywhere connectivity without compromising the user experience. Proven, standards-based cryptographic functions and protocols, however, are processor intensive. Certicom understands that anything that affects performance and usability is a serious problem for your customers. We also realize that meeting the security needs of end-users must not negatively impact your time-to-market or development cost. Certicom s award-winning products and ECC public key technology offer the most secure, highest performance, and smallest footprint on the market. Our integrated Developer Toolkit suite runs on the most popular embedded platforms, and is constantly optimized for size and performance, while still offering the strongest security available. If saving time is what you are after, our Security Applications offer wireless security that s easy to deploy and fits with your customer s existing infrastructure. The Technology Behind the Security Today s security hurdle is bringing the same level of security enjoyed by traditional networks to smaller devices and the wireless world. For encryption, this means the algorithm must be as strong as possible without creating a key length that devours the resources and battery life of mobile devices. These unique demands can be addressed with the Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC), a standards-based, public key technology. AES comes in three strengths: 128 bits, 192 bits and 256 bits. Not only does AES provide more security than 3DES, it also has better performance, making AES highly attractive for use in wireless handhelds. To successfully protect your data, a high security algorithm like AES demands equivalent security for the accompanying digital signatures and key exchanges. Otherwise, AES can be compromised through the weaker security of your public key cryptography. Normally, this would mean the large key sizes required to match AES levels of security would overwhelm the processors of most mobile devices. Fortunately, ECC maintains relatively compact key sizes at all security levels. This makes it ideal for use in constrained, mobile device environments such as PDAs. AES used in conjunction with ECC allows for high security solutions to wireless networking despite the limitations of the operating environment. Certicom has established its leadership in embedded security solutions through ultra-secure, high performance cryptography and was the first to bring ECC to market with the introduction in 1997 of the Security Builder toolkit.

Securing Today s Devices Many emerging devices today require security including handhelds, smartphones, PDAs and other wireless devices that that offer multimedia voice and data. Depending on your requirements, security can be added at many different levels. Integrated at the hardware level, Certicom Developer Toolkits offer your customers simple, proven APIs that can be used to enable hardware-level security functionality. Cryptography directly implemented in silicon offers the highest level of integrity and performance. You can also integrate security functionality into the OS with APIs exposed to other applications. Certicom Developer Toolkits are ideally suited to be the cryptographic service provider for all leading handheld OSs as well as the proprietary ones used to power other devices. For device manufacturers looking to quickly value-add their offering, bundling Certicom Security Applications with a device is an easy way to satisfy organizations requirements for secure network access, secure messaging and secure data storage for handhelds. Web Browsing (HTTP) (SSL) Access (sales force automation) Messaging Content Financial Transactions Applications SSL IPSec Secure Storage PKI S/MIME Core Cryptography Sync Tools Operating System (U) SIM Hardware Smartcard Hardware Accelerators DSP Provisioning & Policy Management Certicom solutions and ECC technolgy can be quickly integrated into any wireless handheld architecture to offer strong strong security with minimal impact on footprint and performance.

Developer Toolkits and Security Applications As the demand continues for more capabilities in applications and increasingly smaller Internet-enabled devices, you need to ensure that your product will work securely and still be easy to use. You also need to get your product to market as soon as possible while remaining costcompetitive. Certicom Developer Toolkits and Security Applications let you embed proven, efficient security technology into your devices and applications without prohibitive delays or expense. With support for a wide range of platforms, standards and protocols, you can be sure that the Certicom technology embedded in your latest device or processor is not only strong and fast, but also extensible and interoperable. web server corporate data application server wireless network local data & files e-mail server Secure HTTP Secure Access Authentication IPSec AES encryption S/MIME Security Builder SSL Security Builder Crypto Security Builder PKI movianvpn moviancrypt movianmail Security Builder GSE FIPS-Certified Module Security Builder GSE FIPS-Certified Module moviandm (Deployment Manager) Developer Toolkits Security Applications Developer Toolkits The Developer Toolkits reduce your time-to-market with a common API that is intuitive to integrate and supports multiple platforms. Security Builder Crypto cross-platform cryptographic toolkit Security Builder SSL complete Secure Socket Layer protocol security toolkit Security Builder PKI digital certificate management toolkit Security Builder GSE FIPS 140-2 Validated cryptographic module Security Applications The Security Applications can be easily integrated into any device to ensure the secure storage and transmission of data using a smartphone or other handheld. movianvpn secure access to the corporate network via mobile devices moviancrypt secure data storage for mobile devices movianmail secure e-mail application for mobile devices Professional Services Certicom Professional Services provides a wide spectrum of information security and cryptographic services. Whether you need an end-to-end enterprise-wide security solution, assistance with a project or application-specific solution, help in engineering a particular security solution, or individual consulting services, we provide the experience and expertise to address your security requirements.

embedded expertise innovative cryptography customer focus The Certicom Advantage Certicom has over 15 years experience developing security for constrained devices, enabling you to use our strengths to your advantage: leading innovator of ECC technology ECC (Elliptic Curve Cryptography) has been endorsed by standards and organizations such as ANSI, IETF, IEEE, FIPS and NIST and is quickly becoming the choice of organizations (such as the US Government) that want highly secure technology which scales with the Advanced Encryption Standard (AES) without compromising on performance. Certicom holds over 120 patents (filed and pending) based on our research into ECC and was the first vendor to ship products developed using this technology. optimized security for size and performance Certicom s patented technologies deliver the strongest cryptography with minimal impact on performance and usability. The Developer Toolkits are highly modular so that unused algorithms can be compiled out to save on footprint and the code is completely thread-safe. With support for over 30 platforms, as well as legacy cryptosystems such as RSA, Certicom is uniquely positioned to offer the most efficient security to the widest variety of applications. delivery and support of complete solutions Given the importance of security today, it s important to ensure that your product gets it right the first time. Certicom Professional Services can work with you to help clarify and solve a wide range of tough security challenges throughout the full project lifecycle from requirements gathering through to design, development and testing. They have many years of experience and the depth of expertise to assist with the implementation of a comprehensive security solution.

North America 1.800.561.6100 Europe +1.905.507.4220 Corporate Headquarters 5520 Explorer Drive, 4th Floor Mississauga, ON, L4W 5L1 Canada Tel: 905-507-4220 Fax: 905-507-4230 info@certicom.com Regional Offices Western US 1810 Gateway Drive, Suite 220 San Mateo, CA 94404 Tel: 650-655-3950 Fax: 650-655-3951 sales@certicom.com Eastern US 1175 Herndon Parkway, Suite 750 Herndon, VA 20170 Tel: 571-203-0700 Fax: 571-203-9653 sales@certicom.com Canada 84 Hines Road Ottawa, ON, K2K 3G3 Canada Tel: 613-254-9270 Fax: 613-254-9275 sales@certicom.com Europe Golden Cross House 8 Duncannon Street London WC2N 4JF United Kingdom Tel: +44 20 7484 5025 Fax: +44 20 7484 5150 europe@certicom.com Certicom is a leading provider of wireless security solutions, enabling developers, governments and enterprises to add strong security to their devices, networks and applications. Designed for constrained devices, Certicom s patented technologies are unsurpassed in delivering the strongest cryptography with the smallest impact on performance and usability. Certicom products are currently licensed to more than 300 customers including Texas Instruments, Palm, Research In Motion, Cisco Systems, Oracle and Motorola. For more info and to access these and other resources, please visit: www.certicom.com/solutions/oem subject to change. PART NUMBER: cert-ss-001-0503 2003 Certicom Corp. All rights reserved. Certicom, Security Builder, Security Builder Crypto, Security Builder PKI, Security Builder SSL, Security Builder GSE, are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information www.certicom.com www.certicom.com