Posts tagged with "Authentication"

23. July 2020
Security is a delicate combination of both technologies and processes, ultimately relying on the end-user to act in accordance with the defined standards and practices. Authenticating your users is the first step. In the past, this was relatively easy to manage as users would connect to the company network and resources mostly using the same computer (and occasionally maybe a laptop from an external location).

14. July 2020
Learn about simple solutions to protect your data and minimize frustration and confusion for end-users. With the exponential growth of mobile device usage in the workplace, security has become one of the primary concerns for companies that need to find a good balance between flexibility and protection, to ensure a good end-user adoption of mobile technologies at work while keeping their infrastructure safe from potential risks at the same time. Every system, no matter how strong, has a weak...