De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...
De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...
De gehele Intercom in lage resolutie (19 MB) - Vereniging Officieren ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
As smartphones and tablets become more popular,<br />
these mobile devices also become more vulnerable.<br />
They might be lost or stolen, or malware could<br />
secretly pass on sensitive <strong>in</strong>formation. That is why<br />
mobile device security is becom<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>gly important.<br />
There are already solutions available that<br />
go further than just a password, such as applications<br />
management, remote management and data encryption.<br />
They may reduce certa<strong>in</strong> risks but they cannot<br />
ensure a completely secure device. Now Fox-IT<br />
is tak<strong>in</strong>g th<strong>in</strong>gs further with the Secure Android<br />
Toolkit.<br />
A package of measures is required to make mobile devices secure. Fox-IT is<br />
now develop<strong>in</strong>g such a security toolkit for the Dutch M<strong>in</strong>istry of <strong>De</strong>fense. This<br />
assignment was prompted by the government’s need to be able to work securely<br />
with tablets and smartphones. In this particular <strong>in</strong>stance, ‘securely’ means at the<br />
so-called ‘<strong>De</strong>p. V.’ security level (i.e. with restricted <strong>in</strong>formation). The complicat<strong>in</strong>g<br />
issues here are user convenience and the idea that you can work more efficiently<br />
on your own familiar device. Now it is possible to comb<strong>in</strong>e Br<strong>in</strong>g Your Own <strong>De</strong>vice<br />
(BYOD) with security at the <strong>De</strong>p. V. level.<br />
The Secure Android Toolkit offers a uniform security layer, so that you can<br />
be sure that there are sound arrangements for the storage of data and that<br />
communication is secure, even if changes are made to the underly<strong>in</strong>g platform.<br />
That means less dependence on certa<strong>in</strong> models and it makes it easier to protect<br />
the latest generation of devices.<br />
Fox-IT offers a toolkit full of sophisticated security features that are <strong>in</strong>dependent<br />
of any specific end-user app. Now new apps can be created quickly and easily <strong>in</strong><br />
order to meet the chang<strong>in</strong>g user requirements without hav<strong>in</strong>g to re<strong>in</strong>vent the<br />
security wheel every time. This split facilitates the development of a secure app<br />
ecosystem <strong>in</strong> which app builders no longer have to be security experts to build<br />
secure apps.<br />
Contact us for a demo of the Secure Android Toolkit.<br />
See www.fox-it.com for more <strong>in</strong>formation.<br />
“<strong>De</strong>velop<strong>in</strong>g android apps for<br />
restricted <strong>in</strong>formation? Use the<br />
Fox-IT Secure Android Toolkit”<br />
Fox-IT prevents, analyzes and limits the most serious cyber threats<br />
with <strong>in</strong>novative solutions for the government, the military, the<br />
police, vital <strong>in</strong>frastructure, banks and major companies around<br />
the world.<br />
for a more secure society<br />
fox-it<br />
Olof Palmestraat 6, <strong>De</strong>lft<br />
po box 638, 2600 ap <strong>De</strong>lft<br />
The Netherlands<br />
t +31 (0) 15 284 79 99<br />
f +31 (0) 15 284 79 90<br />
e fox@fox-it.com<br />
fox-it.com