Posted on 08 July 2015 by
Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series explores how enterprises can do so to gain enterprise mobile security.
Posted on 19 December 2013 by
Bring-Your-Own-Identity (BYOI) represents an evolution in authentication schemes by offering a better user experience and security than the use of multiple passwords for different services.
Posted on 21 March 2016 by
Sadly, cyber security is an area where Batman has room for improvement. Here are three good examples.
Posted on 23 February 2015 by
SafeNet solutions now give you the ability to encrypt sensitive workloads in the IBM SoftLayer cloud platform and own and manage your keys
Posted on 18 March 2015 by
“What are you trying to protect?” It’s a straightforward enough question perhaps, but it isn’t very easy to answer.
Posted on 16 July 2015 by
In today’s global economy, data is king. Organizations are mining their available data to personalize customer experiences, automate processes, outperform the competition, and guide other important business initiatives and decisions. As a result, they’re not only producing more of it, but they’re also storing, processing, and distributing it in more places. So what does that […]