{"id":3055,"date":"2016-05-25T14:23:59","date_gmt":"2016-05-25T14:23:59","guid":{"rendered":"http:\/\/www.automatic-security.info\/?p=3055"},"modified":"2016-05-25T14:23:59","modified_gmt":"2016-05-25T14:23:59","slug":"a-legkorszerubb-lg-okostelefonokat-akar-az-usa-hadserege-is-hasznalhatja","status":"publish","type":"post","link":"https:\/\/www.automatic-security.info\/?p=3055","title":{"rendered":"A legkorszer\u0171bb LG okostelefonokat ak\u00e1r az USA hadserege is haszn\u00e1lhatja"},"content":{"rendered":"<p style=\"text-align: justify;\">Az LG G5 \u00e9s a V10 okostelefonok megkapt\u00e1k az USA Nemzeti Inform\u00e1ci\u00f3biztons\u00e1gi Partners\u00e9g\u00e9nek (National Information Assurance Partnership &#8211; NIAP) tan\u00fas\u00edtv\u00e1ny\u00e1t, ami azt tan\u00fas\u00edtja, hogy ezek a g\u00e9pezetek v\u00e1llalati k\u00f6rnyezetben is megfelelnek az internacion\u00e1lis biztons\u00e1gi el\u0151\u00edr\u00e1soknak.<!--more--><\/p>\n<p style=\"text-align: justify;\">A NIAP a az eg\u00e9sz vil\u00e1gon elismert CCEVS s\u00e9m\u00e1t alkalmazza annak eld\u00f6nt\u00e9s\u00e9re, hogy az adott masina megfelel-e az IT-biztons\u00e1g ter\u00e9n nemzetk\u00f6zileg elfogadott keretrendszernek sz\u00e1m\u00edt\u00f3 Common Criteria standardnek. A NIAP min\u0151s\u00edt\u00e9s\u00e9t a Common Criteria 25 tag\u00e1llama, k\u00f6zt\u00fck Magyarorsz\u00e1g, Kanada, Franciaorsz\u00e1g, N\u00e9metorsz\u00e1g, India, Jap\u00e1n, D\u00e9l-Korea \u00e9s Nagy-Britannia fogadja el.<\/p>\n<div id=\"attachment_3059\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-g5-okostelefon.jpg\"><img aria-describedby=\"caption-attachment-3059\" loading=\"lazy\" class=\"wp-image-3059 size-full\" title=\"LG G5 okostelefon\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-g5-okostelefon.jpg\" alt=\"LG G5 okostelefon\" width=\"600\" height=\"450\" srcset=\"https:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-g5-okostelefon.jpg 600w, https:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-g5-okostelefon-300x225.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-3059\" class=\"wp-caption-text\">LG G5 okostelefon<\/p><\/div>\n<div id=\"attachment_3060\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-v10-mobiltelefon.jpg\"><img aria-describedby=\"caption-attachment-3060\" loading=\"lazy\" class=\"wp-image-3060 size-full\" title=\"LG V10 okostelefon\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2016\/05\/lg-v10-mobiltelefon.jpg\" alt=\"LG V10 okostelefon\" width=\"300\" height=\"225\" \/><\/a><p id=\"caption-attachment-3060\" class=\"wp-caption-text\">LG V10 okostelefon<\/p><\/div>\n<p style=\"text-align: justify;\">Az LG z\u00e1szl\u00f3shaj\u00f3 mobilk\u00e9sz\u00fcl\u00e9kei a t\u00e1rsas\u00e1g GATE (Guarded Access to Enterprise) technol\u00f3gi\u00e1j\u00e1val k\u00e9sz\u00fclnek. Ez olyan korszer\u0171s\u00edtett platform-, h\u00e1l\u00f3zati \u00e9s alkalmaz\u00e1s-biztons\u00e1got ny\u00fajt, amely megb\u00edzhat\u00f3 hozz\u00e1f\u00e9r\u00e9st biztos\u00edt a v\u00e1llalati adatokhoz. A GATE-t, vagyis az LG v\u00e1llalati szint\u0171 platformj\u00e1t 2013-ban alkott\u00e1k meg az\u00e9rt, hogy a biztons\u00e1gi megold\u00e1sok sz\u00e9les palett\u00e1j\u00e1t &#8211; k\u00f6zt\u00fck antihacking- \u00e9s mobileszk\u00f6z-menedzsel\u00e9si rendszereket &#8211; ny\u00fajts\u00e1k a v\u00e1llalati mobileszk\u00f6z\u00f6k r\u00e9sz\u00e9re. A GATE t\u00f6bbr\u00e9teg\u0171 biztons\u00e1gi elemei seg\u00edtenek fenntartani a szoftverkomponensek integrit\u00e1s\u00e1t, er\u0151s\u00edtik a rendszer v\u00e9delm\u00e9t, amellett a teljes\u00edtm\u00e9ny roml\u00e1sa n\u00e9lk\u00fcl \u00f3vj\u00e1k a v\u00e1llalati adatokat.<\/p>\n<p style=\"text-align: justify;\">Mindezen fel\u00fcl a G5 \u00e9s a V10 a Google Android for Work rendszer\u00e9t alkalmazza, amivel m\u00e9g ink\u00e1bb kihaszn\u00e1lhat\u00f3 az LG GATE h\u00e1l\u00f3zati tud\u00e1sa. Az Android for Work egy olyan \u201ekont\u00e9ner-megold\u00e1s\u201d, amely elk\u00fcl\u00f6n\u00edti \u00e9s biztons\u00e1goss\u00e1 teszi a munk\u00e1hoz haszn\u00e1latos applik\u00e1ci\u00f3kat a perszon\u00e1lis alkalmaz\u00e1sokt\u00f3l.<\/p>\n<p style=\"text-align: justify;\">\u201eAzzal, hogy napjainkban az kereskedelmi \u00e9letben mind fontosabb\u00e1 v\u00e1lik a magasabb szint\u0171 biztons\u00e1g, a hordozhat\u00f3 munkaeszk\u00f6z\u00f6k r\u00e9sz\u00e9re elengedhetetlenn\u00e9 v\u00e1lt egy er\u0151s biztons\u00e1gi platform haszn\u00e1lata\u201d &#8211; mondta Chris Yie, az LG Mobile Communications Company aleln\u00f6ke \u00e9s marketingkommunik\u00e1ci\u00f3s vezet\u0151je. \u201eEz a tan\u00fas\u00edtv\u00e1ny meger\u0151s\u00edti azt, hogy az LG okostelefonjai a ma kaphat\u00f3 legbiztons\u00e1gosabb szerkezetek k\u00f6zt vannak.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Az LG G5 \u00e9s a V10 okostelefonok megkapt\u00e1k az USA Nemzeti Inform\u00e1ci\u00f3biztons\u00e1gi Partners\u00e9g\u00e9nek (National Information Assurance Partnership &#8211; NIAP) tan\u00fas\u00edtv\u00e1ny\u00e1t, ami azt tan\u00fas\u00edtja, hogy ezek a g\u00e9pezetek v\u00e1llalati k\u00f6rnyezetben is megfelelnek az internacion\u00e1lis biztons\u00e1gi el\u0151\u00edr\u00e1soknak.<\/p>\n<p class=\"continue-reading-button\"> <a class=\"continue-reading-link\" href=\"https:\/\/www.automatic-security.info\/?p=3055\">tov\u00e1bb<i class=\"crycon-right-dir\"><\/i><\/a><\/p>\n","protected":false},"author":2,"featured_media":3061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[117],"tags":[252,171,138,253],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/3055"}],"collection":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3055"}],"version-history":[{"count":1,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/3055\/revisions"}],"predecessor-version":[{"id":3062,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/3055\/revisions\/3062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/media\/3061"}],"wp:attachment":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}