10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Mobile Security

Mobile Security

LOGO_Mobile Security

Mobile Security

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Employees of organisations, public authorities and also consumers, make use of apps and functions on mobile devices to access data as efficiently and conveniently as possible, independent of time and place. As such freedom and possibilities increase alongside the level of networking – leading to a continual increase in complexity and lack of transparency – the benefits are balanced by considerable risks. The more sensitive the processed data and the specific application scenarios, the higher the pull factor for those wishing to mount attacks. Security, and identification of secure mobile solutions, are posing an ever greater challenge to organizations and consumers.
Evaluation and advisory services for all aspects of mobile security are essential in order to establish an integrated security level in specific application scenarios and to optimise security on an ongoing basis.
Services offered by TÜViT take into consideration procedures, test and evaluation criteria for threat scenarios as contained in national and international standards and best practices (e.g. from OWASP, WASC, CESG and BSI).
Successful evaluations are recognised with a security seal which serves as evidence of trustworthiness for monitoring institutions and customers.

Our services:

  • Evaluation and drafting of concepts and guidelines
  • Support with internal and external acceptance procedures
  • Targeted investigation and implementation of ISMS and further compliance requirements
  • Testing, evaluation and advisory services
  • Confirmation of the security level with a “Trusted Mobile” security seal
  • Continuous monitoring of selected objects to identify new shortcomings
  • Retesting of updates and new releases

Your benefits:

  • Evaluation and advice from an independent and neutral third party
  • Objective determination of the security level
  • Reliable identification of critical vulnerabilities and recommendations for action
  • Project-related, continuous support
  • Signpost for decision makers and those responsible for IT, security and data privacy
  • Confirmation for monitoring institutions and customers
  • Competitive advantage from a TÜViT security seal


Common Criteria Evaluations

LOGO_Common Criteria Evaluationen

Data Center Security


Mobile Security is assigned to following product groups:

There are no entries in your notes.

Show notes


The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.