Industry blog

Posted: 14 Aug 2019
jcarpenter's picture

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

...

Continue reading >>
Posted: 30 Jul 2019
jcarpenter's picture

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of...

Continue reading >>
Posted: 09 Jul 2019
jcarpenter's picture

Strong identity and access management (IAM) is vital to securing your business against cyber attacks, thwarting social engineering attempts and stopping hackers from stealing credentials. You need a solution that provides robust authentication and authorization, balanced with ease of use, to secure your sensitive data and systems.

...

Continue reading >>
Posted: 06 Jun 2019
jcarpenter's picture

The simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, and malicious actors mean that digital security must evolve to stay one step ahead of security threats.

Strong, reliable security in a modern government, non-profit, SMB, or enterprise environment isn’t just important today; it's...

Continue reading >>
Posted: 03 Jun 2019
jcarpenter's picture

What’s Keeping Healthcare Industry Executives and Stakeholders up at Night?

At the recent HealthCare Executive Group’s 30th Annual meeting, more than 100 executives from payer, provider and technology partner organizations ranked the top 10...

Continue reading >>