Monthly Archives: October 2014

Secure contactless authentication via NFC

Near Field Communication, or NFC for short, has been increasingly making a name for itself: near field communication over short distances using wireless technology has already been introduced in contactless payment systems, for example. The new iPhone 6, and its … Continue reading

SecurEnvoy pushes sales in the North American market

The IT security expert SecurEnvoy is further strengthening its presence in North America. The creator of tokenless two-factor authentication recently entered into a partnership with the iNETWORKS Group. The globally active supplier of managed virtualisation, cloud, IT, network and security … Continue reading

Bye bye database – or: why size isn’t everything …

Almost all companies have their own databases. And sometimes you may get the impression that size really matters! The bigger the database, the prouder the company management. But as is so often the case in life, size isn’t everything. In … Continue reading

Bash Bug laughs in the face of traditional password protection

The ease with which hackers can steal sensitive login details from companies was recently highlighted by the Bash Bug vulnerability, which is also known as Shellshock. Companies that rely only on passwords to protect login procedures risk allowing malware to … Continue reading

Strong tokenless authentication brings remote access up to PSN standard

The UK introduced the Public Services Network (PSN) to substantially reduce the cost of communication services across UK government and enable new, joined-up and shared public services for the benefit of citizens. Shetland Islands Council uses the platform extensively and … Continue reading

Bash Bug more dangerous than Heartbleed?

How dangerous is the Bash Bug security vulnerability that recently emerged (also known as Shellshock)?  Is it perhaps even more dangerous than the well-known Heartbleed bug?  This is a question being asked by experts and users since the threat became … Continue reading

Tokenless authentication makes hardware investments unnecessary

Increasing numbers of employees work from home or while on the move. As a result, the need for remote access solutions is growing. And when networks are accessed remotely it is particularly important to verify the identity of users in … Continue reading

Infosecurity Magazine: The Risks Associated with Digital Certificates

“When secure transactions or network access is required, the person requesting access first needs to prove their identity. One of the methods for user identification is digital certificates (certs), which are like digital ID cards. This procedure is examined in … Continue reading

Employees and partners of LuLu Group International use tokenless identification solution for remote access

LuLu Group International has its head office in Abu Dhabi in the United Arab Emirates (UAE) and is active worldwide in more than 31 countries. Its main line of business is the retail sector and it currently operates 110 LuLu … Continue reading

A world without tokens


Upcoming Events

To view more details on our events, Click Here

Contact Us | +44 (0) 845 2600010