Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Proliferation of wireless data forms new security market
Posted on 26-Dec-2003 16:01 | Tags Filed under: News

Proliferation of wireless data forms new security market
Wireless carriers are expanding their data services, and more consumer and business devices are supporting wireless connectivity. There are a number of security risks associated with wireless data, which has driven the creation of a new wireless security market. Most easily addressable within the wireless security market is wireless device security. In-Stat/MDR expects that wireless device security will be a top area of concern for consumers, wireless carriers, and network administrators, as all groups have a stake in the stability and security of the devices. The main challenge in securing wireless devices, according to the high-tech market research firm, is determining whose job it is to secure these devices. Smartphones, normally sold through service providers, are usually considered consumer devices, however, like with the consumer PC market, the average consumer user lacks understanding of how and why to secure their device. Many consumers may demand data security from the service providers and device manufacturers. Meanwhile, corporate IT administrators are torn between the benefits of offering added mobility via wireless devices and the security risks associated with wireless deployment and management.

Additionally, wireless networks are complicating the security equation, as devices that once were predominantly corporate in nature, are now also accessing wireless data networks via hotspots and public areas. These wireless users may be providing malicious users with a backdoor into corporate networks. Additionally, companies that have deployed wireless networks require additional security layers, as existing security measures built into the wireless standards are weak. Wireless LAN security gateways and wireless Intrusion Detection Systems have been developed to provide encryption for corporate wireless data and to identify potential hackers to the wireless network.

  • Within wireless security, there are three addressable markets: Wireless Infrastructure Security, Wireless Device Security and Wireless LAN security. Together these segments are poised to reach US$8.4 Billion by 2008.
  • Wireless devices create security vulnerabilities as carriers of malicious data into corporate networks, in addition to being attacked unto themselves.
  • Laptops, phones, and PDAs are the most common devices accessing wireless networks, and by far, they are the most at risk within the forecast period. However, the number of devices that can be wirelessly enabled is limitless, and as such, the market for wireless security is expected to evolve beyond these communication devices.


  • More information: http://www.instat.com/catalog/Wcatalogue.asp?...
    comments powered by Disqus
    Trending now »

    Hot discussions in our forums right now:

    Vodafone Fibre X Gigabite Extremely slow international speeds.
    Created by goodboy, last reply by ConradB on 23-Jun-2018 17:17 (49 replies)
    Pages... 2 3 4


    AT and rail transport in Auckland - fail.
    Created by kryptonjohn, last reply by peetter on 21-Jun-2018 14:30 (77 replies)
    Pages... 4 5 6


    Bigpipe - Help resolving ticket.
    Created by nunz, last reply by quickymart on 22-Jun-2018 18:22 (30 replies)
    Pages... 2


    Unifi AP location roof space vrs under the house.
    Created by afe66, last reply by cyril7 on 23-Jun-2018 16:10 (14 replies)

    Spark chat help error.
    Created by 3puttssuck, last reply by sdav on 21-Jun-2018 22:09 (14 replies)

    Sub-1Mb ADSL speeds, room for improvement?
    Created by Invisty, last reply by DarkShadow on 20-Jun-2018 14:35 (12 replies)

    Air New Zealand - In Flight Wi-Fi
    Created by MattHNZ, last reply by Linux on 23-Jun-2018 19:00 (11 replies)

    Best budget mattresses?
    Created by TeaLeaf, last reply by Scott3 on 21-Jun-2018 23:35 (11 replies)