Posts tagged with IF-MAP protocol

Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 4

The following is the fourth, and final, post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide...

ESUKOM graphic
Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 3

The following is the third post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated...

Mobile · Rethink Remote Access · SSL

Automated Mobile Security, Part 2

The following is the second post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated...

IT policy · Mobile · Posts

Automated Mobile Security, Part 1

The following the first in a series of excerpts from NCP engineering's technical white paper, Automated Mobile Security:  Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security...

Expert Q&A · Industry Commentary · Rethink Remote Access

Q&A on ESUKOM with Jens Lucius, QA Manager and Trainer at NCP engineering, Part 2

Today, we continue our conversation with Jens Lucius, QA manager and trainer at NCP engineering on the ESUKOM project, which is an initiative that aims to develop a real-time security solution for...