/>
X

Mobile security takes the stage at CommunicAsia

Companies such as VeriMatrix and ST Electronics showcase tools that protect video content, data, phone calls and text messages at this year's ICT tradeshow.
By Ellyne Phneah, Journalist on
sc001-jpg.jpg
1 of 6 Ellyne Phneah/ZDNet
COMMUNICASIA, SINGAPORE--IT vendors showcase security tools which can protect content, phone calls, text messages and data on mobile devices. ZDNet Asia visits some booths to uncover what they are showcasing this year.
sc002.jpg
2 of 6 Ellyne Phneah/ZDNet
Verimatrix, a content security company, has an offering which protects video content on mobile devices.
A company representive said the proliferation of Internet TV had given rise to piracy and created content rights issues. The product, called the Video Content Authority System (VCAS) for Internet TV, prevents non-authorized users from streaming and gaining access to these media.
sc003.jpg
3 of 6 Ellyne Phneah/ZDNet
When users wants access to broadcast or on-demand content, VCAS for Internet TV's technical capabilities "locks" the video and ensures only paying customers are able to enjoy the content.
The software resides on the servers which hosts the Internet video content. Components include the operator management interface for customer care, billing and middleware systems, adaptive content security manager, which generates encryption keys and the MutiCAS adaptive that provides the encryption keys to the encoder.
sc004.jpg
4 of 6 Ellyne Phneah/ZDNet
DigiSafe MobileCrypt, offered by ST Electronics' Info-Security arm, is a microSD card which provides encryption to mobile phonecalls and text messages over both 3G data and Wi-Fi networks. The product has both a frontend encryption module in the card and backend MobileCrypt servers.
The encryption function is implemented inside the microSD card, and all encryption and description processing is performed inside the card.
sc005.jpg
5 of 6 Ellyne Phneah/ZDNet
InspireTech, an multi-platform product vendor, showcased EasiShare, a dropbox-styled service which enables information to be synced and shared securely across various devices including tablets, smartphones, Windows desktops and Macs.
sc006.jpg
6 of 6 Ellyne Phneah/ZDNet
When files are shared with people outside the organization, two-factor authentication (2FA) through SMS is sent to the receiver.
File originators can also restrict access to select files which, InspireTech said, is critical for meetings where sensitive information is transacted. There is also an "auditable" trail which can capture which files are read by whom and when.

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup
Asian woman working at a desk in front of a computer and calculator

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup

8 Photos
ZDNet's research roundup: 5G, cloud computing, cybersecurity, open source, and more
shutterstock-566815405.jpg

Related Galleries

ZDNet's research roundup: 5G, cloud computing, cybersecurity, open source, and more

8 Photos
Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup
remote-working-from-home-man-employee-small-desk.jpg

Related Galleries

Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

8 Photos
Cloud computing, Log4j flaw, IT spending, and more: Tech research roundup
shutterstock-132769316.jpg

Related Galleries

Cloud computing, Log4j flaw, IT spending, and more: Tech research roundup

8 Photos
Quantum computing, programming languages, Chromebook woes, and digital transformation: Tech research roundup
shutterstock-1051141721.jpg

Related Galleries

Quantum computing, programming languages, Chromebook woes, and digital transformation: Tech research roundup

10 Photos
Digital transformation, IT spending, Windows 11, ransomware, and more: Tech research roundup
Serious male executive looking at laptop

Related Galleries

Digital transformation, IT spending, Windows 11, ransomware, and more: Tech research roundup

10 Photos
Tech budgets, digital transformation, cybersecurity dangers, iPhone sales, and more: ZDNet's research roundup
Pensive male thinking over problem solution working on laptop

Related Galleries

Tech budgets, digital transformation, cybersecurity dangers, iPhone sales, and more: ZDNet's research roundup

8 Photos