In my last blog, I left off talking about the different forms of authentication and the abundance of solutions available to enable multi-factor authentication (based on the directive to increase security for user authentication into laptops).
Over the last decade we have seen technology advancements grow in all sectors. For most of us, this is an “expectation” we look forward to: what’s the next cool gadget this year and how does it work? For businesses however, these new technologies are often viewed as: a new requirement that we have to now meet in order to be compliant. This usually means the solution is mandated to address one key design phase – “security”. Security alone doesn’t advance technology; solutions must be innovative, easy to use, manageable, and sometimes even