KommITS' Technology Days
On 18–19 September, SecMaker participated in KommITS' Technology D...
Cloud-based services offer new opportunities and increased flexibility, but they also raise new questions. What happens to business-critical applications and classified data when an external party takes over the administration of the company’s physical IT environment and communication takes place mainly over a public network?
Smart cards and PKI enable a broad application of IT security: twofactorauthentication, digital signing and encryption. Smart card login combined with federation gives the organization a solution that combines maximum IT security with increased flexibility and usability for its employees.
Share this article