Are your customers asking you for a Logical Access Solution?

Are your customers asking you for a Logical Access Solution?

Looking for a Logical Access Partner to handle all the IT concerns? We had a great presence at the ISC West 2013 conference in Las Vegas.  One recurring theme we heard from ID resellers was their desire to offer their existing customers a value add, card based,...
Cyber Authentication – Google Weak on Password Management Systems

Cyber Authentication – Google Weak on Password Management Systems

When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Dovell’s Three Laws of Computers

Dovell’s Three Laws of Computers

Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...