Articles by Darren Learmonth
This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous authentication experience Demand grew for unified identity and access management systems supporting both cards and mobile devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authe...
You may also be interested in
How to drive B2B security & operations with smart surveillanceDownload
Wireless security: Cut costs without cutting cornersDownload
Hybrid hyperconverged systems benefit growing storage and retention needsDownload