X

Mobile security takes the stage at CommunicAsia

Companies such as VeriMatrix and ST Electronics showcase tools that protect video content, data, phone calls and text messages at this year's ICT tradeshow.
By Ellyne Phneah, Contributor
sc001-jpg.jpg
1 of 6 Ellyne Phneah/ZDNET
COMMUNICASIA, SINGAPORE--IT vendors showcase security tools which can protect content, phone calls, text messages and data on mobile devices. ZDNet Asia visits some booths to uncover what they are showcasing this year.

sc002.jpg
2 of 6 Ellyne Phneah/ZDNET
Verimatrix, a content security company, has an offering which protects video content on mobile devices.

A company representive said the proliferation of Internet TV had given rise to piracy and created content rights issues. The product, called the Video Content Authority System (VCAS) for Internet TV, prevents non-authorized users from streaming and gaining access to these media.
sc003.jpg
3 of 6 Ellyne Phneah/ZDNET
When users wants access to broadcast or on-demand content, VCAS for Internet TV's technical capabilities "locks" the video and ensures only paying customers are able to enjoy the content.

The software resides on the servers which hosts the Internet video content. Components include the operator management interface for customer care, billing and middleware systems, adaptive content security manager, which generates encryption keys and the MutiCAS adaptive that provides the encryption keys to the encoder.

sc004.jpg
4 of 6 Ellyne Phneah/ZDNET
DigiSafe MobileCrypt, offered by ST Electronics' Info-Security arm, is a microSD card which provides encryption to mobile phonecalls and text messages over both 3G data and Wi-Fi networks. The product has both a frontend encryption module in the card and backend MobileCrypt servers.

The encryption function is implemented inside the microSD card, and all encryption and description processing is performed inside the card.
sc005.jpg
5 of 6 Ellyne Phneah/ZDNET
InspireTech, an multi-platform product vendor, showcased EasiShare, a dropbox-styled service which enables information to be synced and shared securely across various devices including tablets, smartphones, Windows desktops and Macs.

sc006.jpg
6 of 6 Ellyne Phneah/ZDNET
When files are shared with people outside the organization, two-factor authentication (2FA) through SMS is sent to the receiver.

File originators can also restrict access to select files which, InspireTech said, is critical for meetings where sensitive information is transacted. There is also an "auditable" trail which can capture which files are read by whom and when.

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes
Holiday lights in Central Park background

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes

21 Photos
Winter backgrounds for your next virtual meeting
Wooden lodge in pine forest with heavy snow reflection on Lake O'hara at Yoho national park

Related Galleries

Winter backgrounds for your next virtual meeting

21 Photos
Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes
3D Rendering Christmas interior

Related Galleries

Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes

21 Photos
Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos