Security

Controlling Access, Authentication and Data on the End Point: A Review of DigitalPersona Pro 5.1 for Enterprises

Date Added: Jul 2011
Format: PDF

With security breaches almost constantly in the news, senior managers are challenging their IT staffs to solve security problems before their organizations end up in the headlines. Security breaches are perpetrated by a wide variety of external and internal sources, including hacktivists, targeted attackers, and profit-motivated cybercriminals, as well as through mundane everyday occurrences, such as missing laptops and thumb drives. As a result of all these threats against today's open networks, compliance requirements have emerged that include requirements around access, authentication and protection of sensitive data on end points.