Mobile Encryption: The Good, the Bad and the Broken

  • Thursday, February 28, 2013 | 11:20 AM – 11:40 AM | Room: Room 301
View all Sessions

Effective encryption is paramount to securing sensitive data on mobile devices given their large attack surface. But how effective is mobile encryption? This session will review five different types of mobile encryption (SSL, disk, keystores, app and containers), demonstrate strengths and weakness in each and provide steps that can be taken to improve mobile encryption.

Participants

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions/307/mobile-encryption-the-good-the-bad-and-the-broken on Tue, 29 Jul 2014 06:43:36 -0400.
© 2014 EMC Corporation. All rights reserved.