This document introduces a technical architecture that enables applications installed on mobile phones and similar devices to access security-sensitive applications deployed inside a private corporate network perimeter. The mobile devices may be personal (i.e., "BYOD") or corporate owned/managed, but it is assumed that they are neither wirelessly attached to the corporate network nor necessarily able to establish a virtual private network (VPN) link.

Sections:

  • Introduction
  • The "Bring your own device" trend
  • Security objectives
  • Network architecture, firewalls and connection problems
  • A proxy architecture
  • Encryption keys and device authentication
  • Device activation
  • Device deactivation
  • Security features
  • Usability features
  • Summary

Please register

Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.


Information

required Your company/organization name:

required Your name:

Your title:

Your work telephone number:

required Your work e-mail address:

required Total number of staff in your company:

Please check the information you entered above before continuing.

Click to continue: