Fortifying Your Mobile Security Strategy Using Certificates, Tunnel, and Kerberos
Presented by: Mike Raggo, Director of Security Research
Learn how to leverage advanced mobile security features to fortify your mobile device deployment.
- Using Kerberos Constrained Delegation (KCD) to enhance ActiveSync security through certificates-based authentication, and eliminate passwords, account lockouts and improve the user experience.
- Enabling Tunnel to create application tunnels or per-App VPNs to restrict access now to the App level to deter unwanted or malicious apps from accessing the network and allow access to users in a touchless configuration.
- Leveraging certificate support in Mobile Devices to deploy strong authentication to mitigate brute force and Man-in-the-Middle attacks, and meet compliance requirements.