Authentication

Authentication | News, how-tos, features, reviews, and videos

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.
facial recognition - biometric security identification

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

Load More
Recommended for You