• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Wavelink Secures RF Connections with WPA

    November 11, 2008 Alex Woodie

    Wavelink, a developer of software for mobile devices, rolled out a new product last week that ensures only authorized users can connect mobile devices to corporate radio frequency (RF) networks. Called the Avalanche Certificate Manager, the new product will help prevent hackers from stealing corporate assets from rouge devices, while giving companies the user-level customization they need.

    The danger posed by wireless LANs and RF networks hit home earlier this year when it was revealed that hackers broke into a major retailer’s servers by logging through unprotected wireless networks, a technique that’s become known as “war driving.” To protect themselves from this danger, companies around the country have started to put security systems in place to block unwanted marauders, using a combination of encryption and digital certificates.

    Avalanche Certificate Manager is such a system. The product was designed for Wavelink’s mostly industrial user base, which relies heavily on the System i server and i5/OS-based warehouse management applications, and replaces a potential insecure authentication system that relies on user names and passwords.rn rnAvalanche Certificate Manager uses WPA and WPA2 digital certificates to secure access to RF networks. The software works with Wavelink’s Avalanche Mobility Center and Avalanche CE Secure offerings, and protects data at the device, application, data, and network levels.

    The fact that the product can enforce access at various levels and for multiple users is important. “Ruggedized mobile devices based on Windows CE or Windows Mobile have typically only been able to authenticate to a network using a single identity,” says Lamar Van Wagenen, Wavelink president. “Advanced authentication for these devices is often overlooked, which inherently increases the security risks to the data on the device and network.”

    Thanks to the granularity of Certificate Manager’s security enforcement, companies with large groups of workers who need access to mobile devices can satisfy their corporate security policies, says Martin Brewer, Wavelink director of R&D. “In the real world, companies need to manage thousands of users, and each of these users would have a unique certificate,” Brewer says.

    Wavelink is a Midvale, Utah, provider of terminal emulators and other software that allows users of mobile devices (such as barcode scanners) to connect to host applications, such as an OS/400-based warehouse management system (WMS), via 5250, 3270, VT100, and other common emulation protocols.

    RELATED STORIES

    Wavelink Streamlines OS Upgrade for Barcode Scanners

    Wavelink Goes Java with IDE for Wireless Apps



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrating to New IBM i Hardware?

    Whether you are moving to POWER9, Power10, or a cloud hosted system MAXAVA HAS YOU COVERED!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    BCD:  Attend a Presto How To technical webinar, November 19
    COMMON:  Join us at the 2009 annual meeting and expo, April 26-30, Reno, Nevada
    Vision Solutions:  A $20 gas card for completing a short i5/OS DR survey

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    IBS Under Pressure in Q3, Divests Brasilian Unit What Is AJAX?

    Leave a Reply Cancel reply

Volume 8, Number 41 -- November 11, 2008
THIS ISSUE SPONSORED BY:

Help/Systems
MKS
looksoftware
Bytware
Twin Data

Table of Contents

  • Jinfonet Boosts Performance of Reporting Tool
  • When the Taxman Cometh, Independent Systems Is There
  • SpoolFlex 4.2 Gives Customers More Control Over i Output
  • Informatica Seeds Data Integration Cloud, Sees Pay Off
  • Brainware Teams with Fujitsu on Document Capture Solution
  • Wavelink Secures RF Connections with WPA
  • Two System i Log Management Webinars Scheduled for Tomorrow
  • Lawson Fast Tracks Security Software for S3
  • SMBs Cautious About Tech Spending in ’09
  • RFID Spending to Grow 15 Percent Per Year, ABI Research Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • N2i Gains Traction Among IBM i Newbies
  • Realizing The Promise Of Cross Platform Development With VS Code
  • 2023 IBM i Predictions, Part 3
  • Four Hundred Monitor, January 25
  • Join The 2023 IBM i Marketplace Survey Webinar Tomorrow
  • It Is Time To Have A Group Chat About AI
  • 2023 IBM i Predictions, Part 2
  • Multiple Vulnerabilities Pop Up In Navigator For i
  • Participate In The 2023 IBM i Marketplace Survey Discussion
  • IBM i PTF Guide, Volume 25, Number 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.