Power LogOn® meets US Government’s FIPS 140-2 requirement for networks access control Government regulations mandate agencies to implement multi-factor authentication for secure network access control (NAC). User names and passwords are still the most...
NeMCMHA implements Access Smart’s Network Access Control Solutions Network access control solutions are needed more today than ever before because one of the key components in the Affordable Care Act (Obamacare), the expansion of electronic health records...
Accept it; cyber-attacks are happening to your company too. You may have seen in the news that LivingSocial recently experienced a cyber-attack where 50 million customers’ name, email address and password were exposed. While that news typically makes...
Looking for a Logical Access Partner to handle all the IT concerns? We had a great presence at the ISC West 2013 conference in Las Vegas. One recurring theme we heard from ID resellers was their desire to offer their existing customers a value add, card...
Industry Buzz about NFC Technology for Physical Access I have always believed that any two competing technologies have their advantages when placed in the proper environment. Whether it’s a contact versus contactless smartcard, or NFC versus RFID card, both can...
Multifactor Authentication required by HIPPA & HITECH Access Smart® adds multifactor authentication to McKesson’s Paragon Hospital Information System (HIS) software. Access Smart’s Power LogOn® application requires no modifications to the...
HIPAA Healthcare Data Breach Fines Climb With Enforcement Boost Re-Post By Robert Westervelt, CRN 1:48 PM EST Tue. Jan. 08, 2013 Millions of dollars in fines associated with alleged violations of the Health Insurance Portability and Accountability Act have been doled...
Power LogOn® Enhances Information Security of SAP® Data – Capabilities Study SAP is the market leader in Enterprise Resource Planning (ERP) software solutions that include customer relationship management (CRM), product life management (PLM), supply...
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon...