Security

Controlling Access, Authentication and Data on the End Point: A Review of DigitalPersona Pro 5.1 for Enterprises

Free registration required

Executive Summary

With security breaches almost constantly in the news, senior managers are challenging their IT staffs to solve security problems before their organizations end up in the headlines. Security breaches are perpetrated by a wide variety of external and internal sources, including hacktivists, targeted attackers, and profit-motivated cybercriminals, as well as through mundane everyday occurrences, such as missing laptops and thumb drives. As a result of all these threats against today's open networks, compliance requirements have emerged that include requirements around access, authentication and protection of sensitive data on end points.

  • Format: PDF
  • Size: 644.69 KB