Full disk-encryption is viewed by some enterprises as a cure all for laptop security. Many organizations have requirements that at least some systems be encrypted – especially those that are used by individuals that might have access to sensitive and/or proprietary information. Taking things a step … [Read more...]
The following article was originally written by Terry Gold in RE:ID Magazine for their Spring Issue (Hard Copy). It is meant to share Terry's experience in pioneering the commercial IDaaS market as well as fundamentals and current-state of the market. A detailed research report will be released in … [Read more...]
Editor's Note: We have received several requests to post the full version of the paper without requiring a download. If you prefer to read that (includes analysis and supporting concepts), it can be found here. Alternatively, It can be downloaded in PDF by clicking the box at the bottom. While … [Read more...]
Your an information security professional and need to make sure that your digital assets are secure. You are on top of it. However, you leave the decisions of securing your physical assets (servers, HSMs, racks, backup, etc.) to someone else. Are you aware of what systems are preventing someone … [Read more...]
It's been on my mind for quite some time but the recent acquisitions of Entrust and IdenTrust have prompted me to put it into words. Someone is wrong about where the authentication market is heading, and only time will tell who it is. While in time the answer will be of interest, right now more … [Read more...]
Well just when I was surprised by Datacard's bold move in acquiring Entrust, HID acquires IdenTrust. I didn’t use the word “follows” because acquisitions don't happen overnight, so I highly doubt this was in response to Datacard but rather an effort that started some time ago and independently of … [Read more...]
Even in the midst of conducting a thorough smart card identity credentialing market report, and pondered that the market would reach strategic maturity when major CAs started to get acquired by vendors focused on credentialing, I didn’t see this one coming. Overall, it is a fantastic move on the … [Read more...]
The past couple of recessions have mandated organizations to be more effective with fewer resources. Such requirements have served as key ingredients to fuel a “perfect storm” — where corporate IT’s focus has gone away from just keeping the wheels turning to being more focused on enabling their … [Read more...]
We tend to think that our insurer already knows information about us, but their systems have been tuned more toward accepting and paying claims — often without the details on exactly what was done from a medical standpoint. In fact, most people have never seen their complete health record, and … [Read more...]
I can’t recall exactly when it happened, but at some point the term “identity management” became a wildly popular (and overused) buzz word in physical access. I have to admit, it’s catchy, very easy on the ears, and makes everything seem as though it is relevant to any security aspiration. The … [Read more...]
Sign up to receive notifications about exclusive content, research, events, and more.
Don't worry, we go light on notifications and you can always opt out.