This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Posts tagged with IF-MAP protocol

Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 4

The following is the fourth, and final, post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide...

ESUKOM graphic
Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 3

The following is the third post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated...

Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 2

The following is the second post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated...

IT policy · Mobile · Posts

Automated Mobile Security, Part 1

The following the first in a series of excerpts from NCP engineering's technical white paper, Automated Mobile Security:  Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security...

Expert Q&A · Industry Commentary · Rethink Remote Access

Q&A on ESUKOM with Jens Lucius, QA Manager and Trainer at NCP engineering, Part 2

Today, we continue our conversation with Jens Lucius, QA manager and trainer at NCP engineering on the ESUKOM project, which is an initiative that aims to develop a real-time security solution for...