Mar 03, 2013These days, most commerce is global, communication and information technologies connect the remotest locations into worldwide networks, and there are ever-increasing means of accessing and manipulating data on the Internet, such as smartphones, PDAs and tablets. These new (and often small) resource-constrained devices can be very difficult to secure, and may not always permit traditional IT security to operate efficiently. Revere Security's Hanns-Christian Hanebeck examines how to secure several types of edge devices, ranging from smart power meters to industrial control systems and RFID tags. (5 pages)
Securing Edge Devices
SEND IT YOUR WAY
ASK THE EXPERTS
ASK A QUESTION FOR OUR EXPERTS
ASK THE EXPERTS
View previous question answers »