Full disk-encryption is viewed by some enterprises as a cure all for laptop security. Many organizations have requirements that at least some systems be encrypted – especially those that are used by individuals that might have access to sensitive and/or proprietary information. Taking things a step … [Read more...]
Identification-as-a-Service 101 (IDaas)
The following article was originally written by Terry Gold in RE:ID Magazine for their Spring Issue (Hard Copy). It is meant to share Terry's experience in pioneering the commercial IDaaS market as well as fundamentals and current-state of the market. A detailed research report will be released in … [Read more...]
Replacing Passwords with RFID Cards: A Step Backward
Editor's Note: We have received several requests to post the full version of the paper without requiring a download. If you prefer to read that (includes analysis and supporting concepts), it can be found here. Alternatively, It can be downloaded in PDF by clicking the box at the bottom. While … [Read more...]
Unauthorized Access To Your Data Center: Easier Than You Think
Your an information security professional and need to make sure that your digital assets are secure. You are on top of it. However, you leave the decisions of securing your physical assets (servers, HSMs, racks, backup, etc.) to someone else. Are you aware of what systems are preventing someone … [Read more...]
Evolution of the Authentication Market
It's been on my mind for quite some time but the recent acquisitions of Entrust and IdenTrust have prompted me to put it into words. Someone is wrong about where the authentication market is heading, and only time will tell who it is. While in time the answer will be of interest, right now more … [Read more...]
Opinion: HID acquires IdenTrust
Well just when I was surprised by Datacard's bold move in acquiring Entrust, HID acquires IdenTrust. I didn’t use the word “follows” because acquisitions don't happen overnight, so I highly doubt this was in response to Datacard but rather an effort that started some time ago and independently of … [Read more...]
Opinion: Datacard acquires Entrust
Even in the midst of conducting a thorough smart card identity credentialing market report, and pondered that the market would reach strategic maturity when major CAs started to get acquired by vendors focused on credentialing, I didn’t see this one coming. Overall, it is a fantastic move on the … [Read more...]
The Impact and Dependencies of Cloud in Physical Access
The past couple of recessions have mandated organizations to be more effective with fewer resources. Such requirements have served as key ingredients to fuel a “perfect storm” — where corporate IT’s focus has gone away from just keeping the wheels turning to being more focused on enabling their … [Read more...]
Healthcare: The Benefits of a Federated Identity
We tend to think that our insurer already knows information about us, but their systems have been tuned more toward accepting and paying claims — often without the details on exactly what was done from a medical standpoint. In fact, most people have never seen their complete health record, and … [Read more...]
Killing the identity management hype
I can’t recall exactly when it happened, but at some point the term “identity management” became a wildly popular (and overused) buzz word in physical access. I have to admit, it’s catchy, very easy on the ears, and makes everything seem as though it is relevant to any security aspiration. The … [Read more...]
Stay Updated
Sign up to receive notifications about exclusive content, research, events, and more.
Don't worry, we go light on notifications and you can always opt out.