03.04.2014 Views

De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...

De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...

De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As smartphones and tablets become more popular,<br />

these mobile devices also become more vulnerable.<br />

They might be lost or stolen, or malware could<br />

secretly pass on sensitive <strong>in</strong>formation. That is why<br />

mobile device security is becom<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>gly important.<br />

There are already solutions available that<br />

go further than just a password, such as applications<br />

management, remote management and data encryption.<br />

They may reduce certa<strong>in</strong> risks but they cannot<br />

ensure a completely secure device. Now Fox-IT<br />

is tak<strong>in</strong>g th<strong>in</strong>gs further with the Secure Android<br />

Toolkit.<br />

A package of measures is required to make mobile devices secure. Fox-IT is<br />

now develop<strong>in</strong>g such a security toolkit for the Dutch M<strong>in</strong>istry of <strong>De</strong>fense. This<br />

assignment was prompted by the government’s need to be able to work securely<br />

with tablets and smartphones. In this particular <strong>in</strong>stance, ‘securely’ means at the<br />

so-called ‘<strong>De</strong>p. V.’ security level (i.e. with restricted <strong>in</strong>formation). The complicat<strong>in</strong>g<br />

issues here are user convenience and the idea that you can work more efficiently<br />

on your own familiar device. Now it is possible to comb<strong>in</strong>e Br<strong>in</strong>g Your Own <strong>De</strong>vice<br />

(BYOD) with security at the <strong>De</strong>p. V. level.<br />

The Secure Android Toolkit offers a uniform security layer, so that you can<br />

be sure that there are sound arrangements for the storage of data and that<br />

communication is secure, even if changes are made to the underly<strong>in</strong>g platform.<br />

That means less dependence on certa<strong>in</strong> models and it makes it easier to protect<br />

the latest generation of devices.<br />

Fox-IT offers a toolkit full of sophisticated security features that are <strong>in</strong>dependent<br />

of any specific end-user app. Now new apps can be created quickly and easily <strong>in</strong><br />

order to meet the chang<strong>in</strong>g user requirements without hav<strong>in</strong>g to re<strong>in</strong>vent the<br />

security wheel every time. This split facilitates the development of a secure app<br />

ecosystem <strong>in</strong> which app builders no longer have to be security experts to build<br />

secure apps.<br />

Contact us for a demo of the Secure Android Toolkit.<br />

See www.fox-it.com for more <strong>in</strong>formation.<br />

“<strong>De</strong>velop<strong>in</strong>g android apps for<br />

restricted <strong>in</strong>formation? Use the<br />

Fox-IT Secure Android Toolkit”<br />

Fox-IT prevents, analyzes and limits the most serious cyber threats<br />

with <strong>in</strong>novative solutions for the government, the military, the<br />

police, vital <strong>in</strong>frastructure, banks and major companies around<br />

the world.<br />

for a more secure society<br />

fox-it<br />

Olof Palmestraat 6, <strong>De</strong>lft<br />

po box 638, 2600 ap <strong>De</strong>lft<br />

The Netherlands<br />

t +31 (0) 15 284 79 99<br />

f +31 (0) 15 284 79 90<br />

e fox@fox-it.com<br />

fox-it.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!