Ask Sovay

Protect the Enterprise!

Why tolerate any risk when it is absolutely avoidable? Whether you know it or not, you have probably been a victim of cybercrime! In a 2009 study, 90% of respondents said their company experienced a computer security incident within the past 12 months. An amazing 340,242,628 records […]

Read more

The Negligent Insider

With a few rare exceptions, most breaches occur because of errors that result in compromised credentials. A Verizon Data breach report concluded that 67% of breaches were aided by significant errors. Eventually one of your users will click a link and fall prey to a man-in-the-middle attack, respond […]

Read more

Effective Use of Biometrics Security Systems

Biometrics is coming to replace your password; we should all hope that it does more than just replace the password. Biometrics inherently can eliminate many of the problems with passwords and are subject to the same problems. Like passwords, biometrics can be copied, both purposefully and unintentionally. Great […]

Read more

The Malicious Insider

Do you have any employees that exhibit a sense of entitlement, show signs of job dissatisfaction,  have been denied a request, think they deserve a raise or a promotion, received a bad review, are looking for a better job,  or have received a job offer?  Do you […]

Read more

Real-time Authentication

Real-time authentication is that familiar process of being identified as an authorized user as immediately as the system can perform the verification.  The instant identification is in contrast to a trip to the department of motor vehicles and submitting your credentials, having a person check the information […]

Read more

User Authentication

Identification Software and User Authentication Solutions Most user authentication is accomplished by comparing the attributes of the presented credentials to what is known. Therein lies the fundamental problem: If it is previously known it can be discovered, deduced, copied, stolen or borrowed. Unfortunately, authentication does not provide human […]

Read more

Removing Anonymity

The ability to surf the web anonymously has long been a key reason for the continuing popularity (and explosive growth) of the Internet around the world.  No government, political party or nosy neighbor can tell you what you should or shouldn’t read or view, and no one can find out […]

Read more

What are the Best Biometrics for Securing Your Network?

1   The Best Biometrics We will examine a few biometric technologies, but the most useful ones, by far, can be operated over the Internet, supporting self-service account creation using commodity hardware and software.  The best biometrics are ones that: (1) people will use; (2) will not […]

Read more

Veritrix to Present at CEO Showcase – Stanford Summit

Palo Alto, CA – April 27, 2010 – Veritrix (www.veritrix.com) Популярные развлечения в виртуальном казино Современный человек, который постоянно проводит собственное время на работе, причем не только установленное, но также и сове собственное, должен периодически отдыхать ото всех проблем, которые на него навалились, для этого можно воспользоваться […]

Read more

Veritrix Named "Cool Vendor" by Leading Analyst Firm

Vendors selected for the “Cool Vendor” report are innovative, impactful and intriguing. Palo Alto, CA – April 27, 2010 – Veritrix (www.veritrix.com) Veritrix announced today it has been included in the “Cool Vendors in Identity and Access Management, 2010” report by Gartner, Inc. Veritrix’ product, Sovay, uniquely […]

Read more