IAMS

Security and Government Expo 2019 (SAGE)

SAGE 2019 is organised by Security Electronic & Networks Magazine with support from main industry partner, ASIS ACT, bringing the latest physical and electronic security solutions to government security personnel, as well as government and commercial end users, integrators, installers and consultants serving the nation’s capital and the ACT.

IAHSS Chicago Chapter

The IAHSS Chicago Chapter is hosting a one-day education seminar for healthcare security and safety professionals. Healthcare security and safety professionals from Illinois and surrounding states are invited.

Approaches to Identity and Access Management for Local Governments, Employees and Citizens

Identity and access management (IAM) is top-of-mind for IT departments across state governments, municipalities, and other local areas. Government employees need properly-authorized access to relevant information so that state and regional agencies can perform their roles. At the same time, the need to balance ease-of-access to data with the sensitivity of information about individuals, organizations, and other parties is critical.

Continuous Authentication: Security for an Evolving Threat Landscape

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or misplaces a mobile phone. If a user authenticates only at login, credential misuse mid-session can go unnoticed.

HID® Crescendo® Key Series

HID® Crescendo® Key Series Card

HID Global’s Crescendo Key Series provides proven, strong authentication for employees accessing corporate IT systems. The Crescendo Key Series is designed to be easy and fast to deploy while expanding with continuously evolving needs thanks to proven standards such as PIV and FIDO2. The Crescendo Key solution utilizes Near Field Communications (NFC) and a USB-A or other port while offering the same two-factor authentication and digital and encryption capabilities of a smart card.

The Crescendo Key Series from HID Global provides:

HID® Crescendo® C2300 Series

HID® Crescendo® C2300 Series Card

The Crescendo C2300 provides a high assurance identity, enabling organizations to implement Zero Trust security architecture. Crescendo can be used as a corporate badge, protecting access to facilities, as well a means to protect access to IT networks, computers and applications, whether they are internal or cloud-based. Crescendo is designed to be easy and fast to deploy while expanding with continuously evolving needs thanks to proven standards such as PIV and FIDO2.

The Crescendo C2300 from HID Global provides:

IAHSS Southeastern Region Conference

Taking Mobile Authentication Mainstream

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

A Brief History of the Password & Why It Matters



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking


Protecting Biometrics at Rest, an Essential Tutorial

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of biometric data protection.

Pages

Subscribe