Posts Tagged ‘authentication’

One Device to Control Them All

0

Posted on 12th Sep 2014 by in Telecom

CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]

Securing a platform – it’s a three-way approach

0

Posted on 12th Aug 2014 by in Enterprise

The opening up of enterprise IT due to the effects of consumerization is resulting in ever increasing complexity of the infrastructure with a myriad of devices and applications crowded together. Gartner predicts that by 2017, half of employers will require their employees to bring their own devices to the office. This will benefit organizations and […]

Cloud Security: CloudEntr, Now Secures Logins and Files in a Single Portal

0

Posted on 30th Jul 2014 by in Enterprise

Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]

CloudEntr Brings Big Business Identity and Access Management to the Small Enterprise: A Review

0

Posted on 22nd Jul 2014 by in Enterprise

Over at CloudEntr, we love to be loved by our customers (spoiler: we love them back), so we were especially excited to receive a little press from one of our customers AVISIAN Publishing, publishers of more than 10 print and digital publications specializing in the identification technology space. AVISIAN shared the same pain as many of […]

Why we can’t just rely on central databases for authentication

0

Posted on 21st Jul 2014 by in Enterprise

We now live in an age where reliable and fast information is of paramount importance in our daily lives. Whether banking, communicating, negotiating, or doing any form of business, information on-demand is crucial. Unfortunately, as we’ve become more dependent on access to on-demand banking, contact details, messaging etc., we’ve at times allowed vulnerabilities into our […]

Who should you trust more: Social log-in services or your mobile operator?

0

Posted on 2nd Jul 2014 by in Telecom

Social log-in services can be excellent time-saving tools and are a very convenient way to avoid the tedious process of online registration, filling in numerous forms and general password fatigue. So why are Facebook and Google’s versions of this tool not used more often? The answer’s simple; privacy is paramount to security, so why would […]

What security, M2M and mobile technology tips can we learn from the new Batman?

0

Posted on 1st Jul 2014 by in M2m

Earlier this year, Zach Snyder (of Man of Steel, 300 and Watchmen) tweeted a sneak preview of what the new Batman, played by Ben Affleck, will look like in the upcoming blockbuster Batman v Superman: Dawn of Justice. The photo spread throughout the internet and received over 47,000 retweets in just two weeks. This got […]

Here we go again

0

Posted on 22nd May 2014 by in Enterprise

It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach.  The cybercriminals were able to […]

The death of antivirus?

1

Posted on 21st May 2014 by in Enterprise

Predictions about the demise of any given technology or way of working often turn out to be premature. However, the claim from Symantec Senior President Brian Dye that antivirus software “is dead” feels like a landmark, not least because Dye’s company has been one of the leading vendors of this software for decades. Speaking to […]

What is digital security?

0

Posted on 19th May 2014 by in Enterprise

A question that many an individual, firm or hacker grapples with. Given the rapid transformation of the digital landscape, it’s only natural that security has evolved at a similar speed, requiring us all to stay abreast of the latest developments and to ensure we have digital security. We believe that digital security is really all […]