Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

access control

What is access control? 5 enforcement challenges security professionals need to know

Continuous authentication

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

What is Zero Trust? A model for more effective security

Zero Trust

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

 

Fingerprint and face recognition technology control access at a construction site in China

Fingerprint and face recognition technology control access at a construction site in China

It is certainly unusual to see an advanced fingerprint and face recognition system being used at a noisy construction site, as the way of controlling access for its workers.

Access control in a mobile world

Access Control in a mobile world

Enterprises are granting expanded access to corporate resources— wherever users are, and whatever the device. With an integrated F5 and VMware solution, you can scale, manage, secure, and optimize anytime, anywhere access to your network, cloud, and applications.

 

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

How smart financial institutions develop versatile authentication

A highly connected world has spawned a diversity of security risks. The security stakes are high, if not the highest, for financial institutions.

Gemalto authentication solution aimed at CSPs

Gemalto has released its Protiva Cloud Confirm SaaS solution that offers secure access to cloud-based services. Apart from multi-factor authentication tailored for cloud service provider deployments, the package also includes a mobile one-time password app and security token.

Gemalto authentication solution aimed at CSPs

Gemalto has released its Protiva Cloud Confirm SaaS solution that offers secure access to cloud-based services. Apart from multi-factor authentication tailored for cloud service provider deployments, the package also includes a mobile one-time password app and security token.

3 keys to augmenting password authentication

Today, individuals typically have tens of online accounts, both personal and for work, that require password for access and that number continues to grow as more data and services are made available from the web. 

Bhutan Telecom taps Avaya’s tenant-based manager

Avaya is providing a multi-tenant, web-based and personalized thin client application interface for integrating management and administration of contact center applications. 

Cisco updates security solutions for cloud data centers

IT teams are struggling to keep pace with the demands of changing high-performance virtual and cloud environments, as well as the demands of increased complexity, compliance and employees bringing their own devices to work, among other trends.