‘Simplicity is the ultimate sophistication’ for Access Control

By Tim Boivin (pictured), Marketing Director, PortSys Leonardo DaVinci’s philosophy in the headline has never rung so true as it does today in IT – especially when we’re talking about providing users secure access in our perimeterless world. If your access approach is wrong, your risk of being hacked ramps up exponentially. Counterintuitively, installing more security […]
Do you specialise in Intrusion Detection & Prevention? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion […]
Do you specialise in Access Control solutions? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Access Control solutions specialist […]
WEBINAR: Top 5 reasons why you need an access management solution

By Tenfold Security Do you know WHO in your organization has access to WHAT systems and data? If you don’t know the answer, chances are you haven’t yet employed an IAM solution. And that means your company is at high risk for data theft. You might be struggling to invest the administrative efforts required to […]
Do you specialise in Access Control? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Access Control solutions […]
Identity Access Management vs. Access Rights Management – What’s the Difference?

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions. Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/ If you are […]
69% of SAP users: projects do not prioritise IT security

More than two thirds (68.8%) of SAP users believe their organisations put insufficient focus on IT security during previous SAP implementations, while 53.4% indicated that it is ‘very common’ for SAP security flaws to be uncovered during the audit process. That’s according to the SAP Security Research Report by risk management consultancy, Turnkey Consulting, which […]
Do you specialise in Access Control? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in February we’re focussing on Access Control solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Access Control solutions […]
INDUSTRY SPOTLIGHT: CurrentWare AccessPatrol

Use the latest technology to prevent employees causing data breaches Data theft can rob you of thousands of dollars and countless hours of hard work and effort. So how should a company protect itself from cyber threats? CurrentWare’s AccessPatrol helps secure company endpoints like USBs, DVDs, Bluetooth devices. AccessPatrol allows you to generate comprehensive reports that highlight endpoint device usage […]
Do you provide Access Control solutions? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – in February we’re focussing on Access Control solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Access Control solutions specialist […]