Archive for: Authentication

ZONE SE7EN > Blog > Authentication

post cover

ZONE SE7EN’s Privileged Access Management Roundtable Now Live!

ZONE SE7EN today launch the post event content to our live Privileged Access Management (PAM) Insight Zone Roundtable sponsored by our Platinum sponsor, Dell Security and our Gold sponsor Thycotic, together with speakers from the Cyber Management Alliance, RBS, King and Quocirca. All experts in their field, the exciting Roundtable delivered an informative, lively debate on […]

post cover

Panama Papers – What Happened to Privileged Access Management?

If you haven’t heard or read about the Panama Papers data leak over the last few days, you’ve either been on a remote island in the South Pacific or you’ve had your head in the clouds.  The data breach of law firm, Mossack Fonseca, where a multitude of documents were leaked to a reporter in […]

post cover

Privileged Account Management – Are You Worthy?

At the recent RSA Conference in San Francisco, this was the question asked by Jackson Shaw from Dell Security Solutions.  A speaker on PAM at the conference, he then went on to educate all on the Laws of Privileged Account Management, why it’s important to everyone, and his action recommendations. So, let’s set the scene […]

post cover

DIGIPASS 770 Has Cronto-Based Visual Authentication and Transaction Signing Tools

VASCO Data Security International, Inc., global leaders in authentication, electronic signatures and identity management, announced this week that the DIGIPASS 770 authenticator now has Cronto-based visual authentication and transaction signing capabilities incorporated, using an encrypted colour QR code to protect against cyberattacks. A hand-held, compact authenticator, the DIGIPASS 770 features a colour display, PIN protection, […]

post cover

Bomgar Improves their PAM Solution

Bomgar, leaders in secure access solutions, has announced the release of the updated version of their Privileged Access Management (PAM) solution.  The latest version, Bomgar Privileged Access Management 15.3,  improves security and allows security personnel to control, monitor, manage and audit access to critical systems by third-party and privileged users. Bomgar’s PAM solution allows businesses to quickly control […]

post cover

CA Technologies Adds Breach Prevention Capabilities to Control Privileged User Access

CA Technologies this week announced the release of new products in their identity-centric security portfolio designed to protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe. The new release of CA Privileged Access Manager aids in the control of privileged user access to VMware NSX environments, whilst new updates to their […]

post cover

Survey Finds Privileged Access to Federal IT Systems Still a Problem

A recent survey has established that federal workers have access to more IT systems and applications than they actually need; in addition, people working in the more sensitive systems are often unmonitored. According to the Dell report, of the 150 federal IT professionals participating in the survey, 92% said that employees within the organisation had […]

post cover

Cloud Computing; Great, But What About Security?

As we become more accustomed to huge amounts of data that we have to deal with, and the world in which we live in is ever-more digital, organisations worldwide face the challenges of storing and analysing – the cost of storage, albeit cheaper than in recent years; processing the data; analysing and extracting the relevant […]

post cover

Bio-Metrica Launch their Multifactor Identity Framework

Identity company, Bio-Metrica, has announced the launch of their new multifactor identity framework that has been developed to operate with a range of biometric and non-biometric authentication methods. The Biometric Identification Infrastructure (BII) is a web services framework allowing applications to use different biometric data types, such as fingerprint, speech, facial or signature recognition, iris, […]

post cover

Mobile Security: Do the Basics!

By Allie Philpin As mobile device users, be it for work or personal use, you can’t turn the corner without hearing about the latest threat to the security of our data!  Companies are falling over themselves to provide us with the latest technological innovation that will secure your mobile device better than anything else on […]

Subscribe to our mailing list

* indicates required Email Address * First Name * Last Name *