COMMUNICASIA, SINGAPORE--IT vendors showcase security tools which can protect content, phone calls, text messages and data on mobile devices. ZDNet Asia visits some booths to uncover what they are showcasing this year.
2 of 6 Ellyne Phneah/ZDNet
Verimatrix, a content security company, has an offering which protects video content on mobile devices.
A company representive said the proliferation of Internet TV had given rise to piracy and created content rights issues. The product, called the Video Content Authority System (VCAS) for Internet TV, prevents non-authorized users from streaming and gaining access to these media.
3 of 6 Ellyne Phneah/ZDNet
When users wants access to broadcast or on-demand content, VCAS for Internet TV's technical capabilities "locks" the video and ensures only paying customers are able to enjoy the content.
The software resides on the servers which hosts the Internet video content. Components include the operator management interface for customer care, billing and middleware systems, adaptive content security manager, which generates encryption keys and the MutiCAS adaptive that provides the encryption keys to the encoder.
4 of 6 Ellyne Phneah/ZDNet
DigiSafe MobileCrypt, offered by ST Electronics' Info-Security arm, is a microSD card which provides encryption to mobile phonecalls and text messages over both 3G data and Wi-Fi networks. The product has both a frontend encryption module in the card and backend MobileCrypt servers.
The encryption function is implemented inside the microSD card, and all encryption and description processing is performed inside the card.
5 of 6 Ellyne Phneah/ZDNet
InspireTech, an multi-platform product vendor, showcased EasiShare, a dropbox-styled service which enables information to be synced and shared securely across various devices including tablets, smartphones, Windows desktops and Macs.
6 of 6 Ellyne Phneah/ZDNet
When files are shared with people outside the organization, two-factor authentication (2FA) through SMS is sent to the receiver.
File originators can also restrict access to select files which, InspireTech said, is critical for meetings where sensitive information is transacted. There is also an "auditable" trail which can capture which files are read by whom and when.