Generic filters

access control

Beyond the Perimeter – Enhancing Access Control

This session will discuss how to shift your capabilities beyond baseline security, by unifying the Cloud to the Endpoint as part of a holistic Zero Trust Architecture strategy. You can shrink your attack surface drastically via enhanced access control, leveraging the latest integrations announced between Zscaler and CrowdStrike.

YubiKey 5C NFC

The YubiKey 5 Series is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, and enables compliance requirements for strong authentication.

General Access Control Guidance for Cloud Systems

Executive Summary Cloud systems have been developed over time and conceptualized through a combination of software, hardware components, and virtualization technologies. Characteristics of the cloud, such as resource pooling, rapid elasticity, and pay-as-you-go services, accelerated its wide adoption by industry, government, and academia. Specifically, cloud systems offer application services, data storage, data management, networking, and …

General Access Control Guidance for Cloud Systems Read More »

YubiKey 5Ci

The YubiKey 5Ci combines hardware-based authentication and public key cryptography to eliminate account takeovers.

Derived Personal Identity Verification (PIV) Credentials

Pivot toward using derived PIV credentials on mobile devices. The federal government relies on PIV cards to securely authenticate and identify employees and contractors when granting access to federal facilities and information systems.

The Advanced Analytics of Security Entrances

Boon Edam Inc., has published a whitepaper for security professionals. Titled ‘The Advanced Analytics of Security Entrances’, the whitepaper provides information and guidance about the data that can be extracted from security entrances.