Download now Free registration required
OpenTrust places trusted digital identities at the root of each information system component, be this the network and each active network component (router, hub etc.), the workstation or device (PC, Laptop, Smart phone, etc.), the user (or to be more precise the digital identity that will be used by the systems and applications), or the systems and the applications themselves that require authentication, traceability and privacy. It also says that the first step in securing I.T. systems is to use traditional perimeter and defensive solutions (Firewall, filter/authentication proxy, anti-SPAM, anti-virus, IDS (Intrusion Detection System), etc.), purpose-built to protect assets and detect and remedy vulnerabilities.
- Format: PDF
- Size: 102.21 KB