Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Proliferation of wireless data forms new security market
Posted on 26-Dec-2003 16:01. | Tags Filed under: News.

Proliferation of wireless data forms new security market
Wireless carriers are expanding their data services, and more consumer and business devices are supporting wireless connectivity. There are a number of security risks associated with wireless data, which has driven the creation of a new wireless security market. Most easily addressable within the wireless security market is wireless device security. In-Stat/MDR expects that wireless device security will be a top area of concern for consumers, wireless carriers, and network administrators, as all groups have a stake in the stability and security of the devices. The main challenge in securing wireless devices, according to the high-tech market research firm, is determining whose job it is to secure these devices. Smartphones, normally sold through service providers, are usually considered consumer devices, however, like with the consumer PC market, the average consumer user lacks understanding of how and why to secure their device. Many consumers may demand data security from the service providers and device manufacturers. Meanwhile, corporate IT administrators are torn between the benefits of offering added mobility via wireless devices and the security risks associated with wireless deployment and management.

Additionally, wireless networks are complicating the security equation, as devices that once were predominantly corporate in nature, are now also accessing wireless data networks via hotspots and public areas. These wireless users may be providing malicious users with a backdoor into corporate networks. Additionally, companies that have deployed wireless networks require additional security layers, as existing security measures built into the wireless standards are weak. Wireless LAN security gateways and wireless Intrusion Detection Systems have been developed to provide encryption for corporate wireless data and to identify potential hackers to the wireless network.

  • Within wireless security, there are three addressable markets: Wireless Infrastructure Security, Wireless Device Security and Wireless LAN security. Together these segments are poised to reach US$8.4 Billion by 2008.
  • Wireless devices create security vulnerabilities as carriers of malicious data into corporate networks, in addition to being attacked unto themselves.
  • Laptops, phones, and PDAs are the most common devices accessing wireless networks, and by far, they are the most at risk within the forecast period. However, the number of devices that can be wirelessly enabled is limitless, and as such, the market for wireless security is expected to evolve beyond these communication devices.

  • More information:

    comments powered by Disqus

    Trending now »

    Hot discussions in our forums right now:

    Gigabit cable now available
    Created by sub, last reply by Hammerer on 22-Oct-2016 15:37 (52 replies)
    Pages... 2 3 4

    Sony XZ Owners discussion
    Created by networkn, last reply by tripp on 22-Oct-2016 16:48 (77 replies)
    Pages... 4 5 6

    Who is this women? She is possibly the most famous women on the internet and nobody knows who she is.
    Created by jimbob79, last reply by cynnicallemon on 20-Oct-2016 13:28 (14 replies)

    Labour weekend plans?
    Created by DarthKermit, last reply by joker97 on 22-Oct-2016 09:51 (27 replies)
    Pages... 2

    Is windows 10 anniversary update causing you problems
    Created by robjg63, last reply by mdav056 on 20-Oct-2016 14:01 (27 replies)
    Pages... 2

    Don't worry about drugs. Helium possession is what will get you busted!
    Created by Rikkitic, last reply by Rikkitic on 19-Oct-2016 11:11 (27 replies)
    Pages... 2

    Staying charged in USA and Canada?
    Created by kiwifidget, last reply by sbiddle on 21-Oct-2016 19:36 (12 replies)

    Does anyone use Ebay?
    Created by TeaLeaf, last reply by Dingbatt on 22-Oct-2016 16:19 (11 replies)