Annual Reports

The National Institute of Standards and Technology (NIST) has advocated the use of integrated hardware security to protect against Advanced Persistent Threats, while Microsoft made support for trus
A new computing model has emerged in the past few years. It is based on the identity of the device, not just the user, and is independent of the type of connection.

Application Briefs

Data breaches have only increased in frequency and severity - and consequences for healthcare organizations found to be negligent in safeguarding patient information have never been higher.
To better succeed at their missions, state and local governments are incorporating enterprise applications and mobile technologies — especially laptops — across their organizations.


Wave Virtual Smart Card 2.0 is a two-factor authentication solution similar to physical smart cards and tokens, but at 50% lower total cost of ownership.
Ever heard of "something you know, something you have, and something you are"? Learn what authentication techniques this saying refers to, and how they can combine to create the strongest assurance...
Je gehört habe "etwas, das Sie wissen , was Sie haben, und etwas, was Sie sind"? Erfahren Sie, welche Authentifizierungstechniken dieses Sprichwort bezieht sich auf , und wie sie zu kombinieren, um...
Self-encrypting drives (SED) are the same as standard hard drives, with one key difference: they embed encryption into the drive itself, so you don’t need encryption software.