Mobile Encryption: The Good, the Bad and the Broken

  • Thursday, February 28, 2013 | 11:20 AM – 11:40 AM | Room: Room 301

View all Sessions

Effective encryption is paramount to securing sensitive data on mobile devices given their large attack surface. But how effective is mobile encryption? This session will review five different types of mobile encryption (SSL, disk, keystores, app and containers), demonstrate strengths and weakness in each and provide steps that can be taken to improve mobile encryption.


This document was retrieved from on Sun, 29 Nov 2015 21:38:28 -0500.
© 2015 EMC Corporation. All rights reserved.