CFOtech UK - Technology news for CFOs & financial decision-makers

Access Control stories - Page 32

Hid mobile access signo v2

Mobile identities and the changing landscape of access control

Mon, 13th Nov 2023
#
firewalls
#
network security
#
physical security
As the world continues to embrace digital transformation, mobile access is poised to play a central role in the evolving landscape of access control.
Gettyimages 1505784611

Flexxon launches Xsign: Innovative hardware security solution

Thu, 12th Oct 2023
#
firewalls
#
network security
#
physical security
Flexxon's Xsign is an innovative hardware security solution that safeguards confidential data by only allowing access to verified users.
Gettyimages 1132912672

Varonis Labs discovers SQLi and access flaws in Zendesk

Wed, 16th Nov 2022
#
firewalls
#
network security
#
physical security
Varonis helped solve an SQLi vulnerability and an access control flaw in Zendesk Explore that would have allowed a threat actor to leak data.
Cyberark

CyberArk releases updates to deliver broader identity protection

Wed, 9th Jun 2021
#
saas
#
firewalls
#
network security
CyberArk enhances its identity security platform with new cloud solutions and shared services to protect access and provide broad identity protection.
Gettyimages 1199640854

Financial firms exposing data through mismanaged access controls - Varonis

Fri, 20th Nov 2020
#
firewalls
#
network security
#
fintech
Almost two-thirds of the analysed firms leave more than 1000 sensitive files open for every employee to access.
Gettyimages 1133860023

One Identity & Ping Identity join forces on identity management

Mon, 3rd Aug 2020
#
firewalls
#
network security
#
physical security
The partnership brings together Ping Identity's access management technology with One Identity's identity governance and administration (IGA) technology.
Identity and access management7

Cloud-based ID card issuance will reinvent government processes

Thu, 6th Jun 2019
#
firewalls
#
network security
#
physical security
HID Global meets the most demanding requirements for security, quality, and effective program execution in today's most complex ID programs.
30

Who's listening?

Thu, 1st Jul 2010
#
uc
#
firewalls
#
vpns
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.