Secure Mobile Device For Enterprise

With the introduction of cool mobile devices available for corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile…

Risk Based Authentication

The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or…

Biometrics Authentication

Passwords and personal identification numbers (PIN) are information that we need to remember since the day we started interacting with digital systems. Do we know the count of passwords we…

Security Architecture Framework

Security Architecture Framework should provide comprehensive view of security in the enterprise and be the reference model for any security architecture artifacts and all design.