PDAs are so portable as to make them susceptible to loss or theft - in a business environment the net result of this can range from inconvenience and embarrassment, right on up to serious problems with the regulatory authorities. Which is where SafeGuard PDA enters the frame. Like similar offerings from F-Secure and Pointsec, the software is designed to make a Pocket PC-based PDA as secure as electronically possible.
Managing a network has never been easy, whether it comprises 100 or 100,000 machines. Even with a dedicated network administrator, the overheads are horrendous. Rolling out new applications, checking for non-licensed software, looking at network traffic... full-time tasks that often have no one with a full-time job to attend to them. This becomes even more worrying when you consider the security implications.
One-factor authentication (user IDs and password) is still the most widely used method, primarily because it is simple, easy and there are no pieces of hardware to configure. But there are many applications where this is just not secure enough. In two-factor authentication, not only do users need to know a PIN but they also need to possess the correct token. This higher level of security, combined with the token's memory and cryptographic processing capabilities, makes it particularly attractive as a solution for many situations such as digitally signing documents and mails and authenticating the user remotely for access to corporate networks through VPNs.
Cyber-Ark's Inter-Business Vault is designed to protect confidential files in an extranet environment, where secure file sharing with remote offices and business partners is demanded. This requires a combination of secure file storage, encryption for files in transit, authentication and access control. There are many products that tackle these problems individually. For example, a virtual private network (VPN) encrypts files in transit, and access controls are built into modern operating systems. However, OS access controls can often be bypassed simply because unhardened operating systems are themselves so easy to compromise. Inter-Business Vault aims to address all of these problems by integrating a VPN, authenticated access controls and encrypted file storage in a very secure solution.
RemotelyAnywhere is a relatively late arrival to the remote access software landscape. Despite this, the package is arguably the most complex currently available on the market, offering the IT professional full access to a remote machine's facilities, even allowing a full reboot on the fly.
Boingo uses a similar network aggregation model seen on ISP networks from the likes of iPass and GRIC. But it goes further with its business model, collecting and distributing usage revenues amongst the various network operators whose Wi-Fi hotspots it uses.
The Cloud, a division of Inspired Broadcast Networks, is something of a low profile public Wi-Fi network, preferring to stay in the background as a wholesale wireless network operator.
When the service was launched earlier this year, the company offered access through two options, pay-as-you-use sessions from a variety of outlets, or through third parties, such as BT OpenZone, whose users can now roam seamlessly onto The Cloud's network.