Important:
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
A version of this page is also available for
4/8/2010

With mobile devices providing connectivity for data access, secure communication is imperative. Remote access through the device, such as using the Internet, exposes the device to all known forms of attack and interception. To guard against these threats, devices can use the following authentication protocols.

Network Authentication (SSPI)

Remote Access

Virtual Private Networks

WAP Security

See Also