Mobility Under Control

Laptops are all too often the weakest link in information
systems. To guarantee the confidentiality and integrity
of exchanges with mobile terminals, Arkoon recommends strong, bilateral authentication, encryption adapted to the information stored and transmitted, use of virtual private IP links (VPNs) and centralised management of keys and security rules.