Mobile security platform introduced by Fujitsu

Mobile Security TechnologyFujitsu takes on the growing problem of mobile security

Mobile security has become a major issue for consumers all over the world. As more people engage in things like mobile commerce and mobile marketing, they are becoming prime targets for hackers and malicious groups bent on exploiting financial and personal information. To combat the growing concerns that are emerging in the mobile security world, new solutions are being developed and released at a rapid pace. Fujitsu Laboratories, a leading developer of IT products and services, is one of the companies responsible for a new generation of mobile security solutions.

New security platform in development

Fujitsu has announced the development of a new security platform for smart phones, called the Mobile Enterprise Application Platform. The platform is being designed specifically to protect corporate data, but may eventually become a widely used tool throughout the mobile market. One of the things that has garnered Fujitsu’s new platform a great deal of attention is the fact that it is HTML 5-based. The platform also incorporates cloud computing, creating what Fujitsu believes to be a highly secure system.

Platform provides access to HTML 5 applications

The platform connects a  smart phone to a cloud-based computer server, which provides users with access to a wide variety of corporate applications, such as email, sales databases, and customer information, all as HTML 5 applications. These applications are available for all smart phones because they are based on HTML 5 rather than the programming languages exclusive to the iOS and Android platforms. The cloud network encrypts the information that users access, thereby creating an extra layer of security.

Cloud network protected by strict security features

The platform also imposes a variety of security measures on a mobile device while it is connected to the cloud network. When a device makes the connection, for example, the platform will deactivate the device’s camera and prohibit a user from taking pictures of the screen through their device’s internal services. The platform also restricts Internet access to avoid the possibility of visiting malicious websites or downloading malware. Once the connection with the cloud network is severed, however, the device  becomes from off these restrictions.

Add a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.