BLOG

MOBILITY: GAME CHANGER

Mobility is a game changer in many ways, and in some ways it is another manifestation of the same security problems plaguing enterprises. The client, or last tactical mile as we like to put it, is often a common target of a malicious attack. The client is where all of the security controls, decryption, and authorization decisions have run their course: an end customer is viewing data in the clear.

MORE

 

 

 

IDENTITY DOMINANCE

Most people are familiar with the need to authenticate a person. Equally important is the need to authenticate software and systems in conjunction with the person using them. In other words, you should authenticate both the person and the manner in which he or she is accessing data. This forms the beginning of establishing trust principals throughout your enterprise…

MORE

 

 

TRUST NO ONE

How do you build a security apparatus that has to defend against an insider who has perfect knowledge of your IT infrastructure, elevated administrator privileges, and resides within your security perimeter? A growing number of organizations are beginning to ask this question, but many do not know where to begin.

MORE