Access management: centralized vs. distributed
Published on January 28, 2015
The mainframe is a reliable solution for centralizing so many business computing processes. Therefore, it is only natural to use it to centralize the authentication and identity management processes for all the applications users need across the enterprise. A centralized access management is typically more…
Keep employees safe from phishing attacks
Published on January 21, 2015
Data encryption and access controls make it very difficult for hackers to access private data without first stealing the appropriate user credentials or decryption keys. Brute force attempts to hack into accounts by guessing passwords can be thwarted by locking an account after a certain…
ASPG Helps Texas Universities Attain Success in Meeting New Security Regulations
Published on January 14, 2015
Naples, FL – December 2014 Multi-factor authentication, the requirement of users to identify themselves both through something they know (such as a username or email account credentials) and something they have (like a cell phone or key fob), is a security measure which has become…
MegaCryption Adds Record-Level Encryption Adapter for Innovative Cryptography Options
Published on January 13, 2015
Naples, FL – December 2014 MegaCryption now offers the ability to encrypt and decrypt individual records for usage in a specific program or transaction, commonly known as record-level encryption, through its Record-Level Encryption Adapter (RLEA). As a record-level and file-level cryptography solution, MegaCryption provides a…