28 January 2022

Nimans

IDIS distribution deal with Nimans

Nimans, a UK-based independent technology distributor, has confirmed a new distribution agreement with IDIS,  a South Korean video security technology provider and one of Europe’s fastest growing manufacturers. The deal will support Nimans’ customers with rapid in-stock availability of complete, end-to-end video solutions for applications including retail, education, commercial settings, healthcare and more. The fast growth in demand for IDIS’s NDAA-compliant video technology means its solutions are now providing highly secure but affordable protection in settings ranging from the NHS, data centres, and corporate offices to housing estates, schools and retail chains. IDIS’s extensive DirectIP range includes network cameras, NVRs and network accessories backed by extended warranties against equipment failure – an industry-best guarantee of support and protection – and offers installers the advantages of true plug-and-play set up that make implementation faster, with assured compatibility and full system functionality first time. IDIS offers a choice of video management software including the licence-free IDIS Centre VMS for applications up to 1,024 devices, and the IDIS Solutions Suite VMS which provides the most flexible and powerful foundation for large and multi-site monitoring operations. IDIS is also at the forefront of developing advanced, deep-learning video analytics to help users automate surveillance tasks – from object and loitering detection to people counting and building occupancy monitoring. Utlising these highly-accurate AI-powered features, empowers security operatives to strenthen safety and security, reduce operating costs, and increase business intelligence. Camilla Kirkham, Head of Nimans Security & AV division commented, “We are delighted to offer the IDIS unique range of DirectIP and NDAA-compliant products to our customers. Our appointment as an IDIS distributor further enhances Nimans commitment to bringing leading technology to our large customer base.” Jamie Barnfield, Senior Sales Director, IDIS Europe, welcomed the partnership with Nimans: “With demand continuing to grow for end-to-end solutions, including for emerging deep-learning analytics, this agreement will make it easy for Nimans’ customers to deliver advanced video projects and compete for major contracts using IDIS’s proven and trusted technology.” IDIS is a global security company that designs, develops, manufactures, and delivers surveillance solutions for a wide range of commercial and public sector markets. As a video surveillance manufacturer in South Korea, headquartered just outside of Seoul and operating across 50 countries and 100+ strategic partners, IDIS is a solution provider with more than two million recorders installed worldwide and over 16.5 million cameras utilising IDIS technology.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

IDIS distribution deal with Nimans Read More »

Entrust

Entrust enhances remote signing solution

Entrust, a provider of trusted identities, payments, and data protection solutions, has announced that it has successfully completed Common Criteria evaluation of its Remote Qualified Signature Creation Device (QSCD), to build an eIDAS-compliant solution that combines nShield Hardware Security Modules (HSMs) and the Entrust Signature Activation Module (SAM). With publication of the final certification expected in March 2022, this solution provides a highly secure platform for the creation of qualified cloud signature and seal services. This enables Trust Service Providers (TSPs) the capability to provide eIDAS-compliant remote signing for their customers. As organisations globally are rapidly seeking ways to enable digital workflows that meet the highest standards for confidence, trust, and compliance, the new Entrust solution delivers easy application integration in a scalable architecture that can cater to different capacity demands. Furthermore, the Remote Signing Solution integrates and supports external identity providers and doesn’t require any changes to an organisation’s signing application structure. The Entrust SAM is a crucial security component of an eIDAS-compliant digital signing service: it ensures that signers keep sole control of their signing keys. The Entrust SAM runs in the tamper-protected environment of the QSCD enabled by the already Common Criteria certified Entrust nShield Connect XC or Solo XC. All signature requests to the nShield XC HSMs go through the SAM first, where it verifies and authorises the signing process. “The Entrust SAM software on top of the highly reliable nShield HSM has enabled us to build a cloud signature platform fully compliant with eIDAS and national requirements, allowing our development teams to focus on added value and not product certification,” said Pere Barba, CTO at Vintegris. “We have developed an integration with Entrust SAM and nShield HSM with our remote signing solution that together forms the Type II QSCD. In collaboration with the Entrust team, we have achieved great results with the overall performance. We are excited about its flexibility and transparency. The remote signing solution can be deployed by anyone interested in advanced or qualified infrastructure,” added Roman Cinkais, CEO of 3Key Company. “Entrust offers a broad portfolio of certified products and services that help enterprises, government institutions, and qualified trust service providers to quickly deploy compliant services,” said Willem-Jan Bruin, Director of Business Development at Entrust. “The nShield XC HSMs have completed the Common Criteria EAL4+ certification to establish a strong root of trust that anchors the security for signing and sealing applications. In addition, the Entrust SAM has achieved eIDAS QSCD certification (CEN EN 419 241-2) in combination with the nShield Connect XC and nShield Solo XC HSMs. The completion of the Common Criteria evaluation for the QSCD builds on this foundation to ensure full regulatory compliance.” The Entrust Remote QSCD is a logical step in Entrust’s long-term strategy to serve TSPs and Signing System Integrators globally. Through developments like this, Entrust continues to invest in its portfolio, services, and partners, enabling the digital transformation, and protecting the identity and critical data of people, enterprises, governments and (IoT) devices.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Entrust enhances remote signing solution Read More »

Network infrastructure and security systems integrator, Data Installation & Supplies (DIS), has formalised its working relationship with

Quanika partnership with DIS

Network infrastructure and security systems integrator, Data Installation & Supplies (DIS), has formalised its working relationship with Quanika in a partnership deal that will drive advanced integration projects in high demand sectors including logistics and online retail warehousing and e-commerce services. Quanika technology is enabling a new generation of security and site management solutions that leverage the power of corporate databases – including Microsoft Active Directory – helping customers to operate their sites more efficiently in increasingly competitive landscapes. DIS reports that it is growing strongly in sectors including warehousing, logistics, manufacturing and retail, all of which have to manage high throughputs of staff, visitors and site users. The partnership with Quanika now allows DIS to deliver advanced – and increasingly customised – solutions integrating best-in-class video and access control hardware from Axis Communications along with multiple technologies from other vendors. “Quanika software lets us power Axis Communications access control hardware to create complete end-to-end security solutions that operate from a single pane of glass. We’ve been an Axis surveillance Gold partner for years, now Quanika’s software is a game-changer for us,” said Adam Foster, Technical Director, DIS. “Another key advantage of working with Quanika is the company’s ability to adapt and customise solutions and develop new integrations at speed. When we request a new feature or function the development turnaround is impeccable – whether that’s something bespoke to one customer or something with wider market applications to benefit more projects.” Quanika’s integration model, combines off-the-shelf affordability with bespoke tailoring whenever required. Its core software offerings, Quanika Enterprise and VisitorPoint, are giving DIS customers more practical, affordable migration routes away from outdated, siloed systems and technology stacks which are less efficient and less secure. They are also transforming the way organisations control access to their premises, facilities and networks, and manage a growing number of functions – including time and attendance, and payroll – by automatically exchanging data between access control and visitor management systems and popular corporate databases such as Active Directory. Quanika Enterprise combines advanced access control functionality with the ability to manage video surveillance and wider building management systems to give organisations multi-site management and control from a single user interface. VisitorPoint synched with Active Directory allows organisations to manage their staff, contractors and visitors under one single umbrella giving them the flexibly to adapt to the latest security, safety, and operational requirements. The overall increased efficiency – with greater user convenience and more positive visitor experiences – is particularly important for organisations looking to adapt to labour shortages by improving working conditions and staff retention, said, Sales Director, Phil Campbell. “With the continuing economic pressures arising from the pandemic, customers are looking to care for their people with frictionless access and a smooth experience every time they arrive at a site, whether that’s full-time staff, contractors, regular visitors or a guest attending for the first time,” said Phil. “We are delighted to be working with DIS to make this a reality for many more organisations. Together we are giving customers the advantages of affordable complete security and safety solutions with off-the-shelf integrations, and the ability to quickly add new systems and devices to meet site-specific challenges.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Quanika partnership with DIS Read More »

Ericsson

Ericsson to showcase 5G and technologies at LEAP

Ericsson has announced its participation at LEAP 22 taking place in the Riyadh Front Expo Centre from February 1 to February 3, 2022. At the technology event, Ericsson is set to exhibit groundbreaking innovations in cellular technology. Through speeches, demonstrations, and orbital talk sessions, Ericsson will showcase its latest innovation along with interactive demonstrations that range from enterprise and consumer 5G use cases to Industry 4.0 applications. Highlighting its widespread 5G footprint in Saudi Arabia, Ericsson will paint a digital and technological roadmap that goes in-line with the Kingdom’s National Vision 2030, including smart cities and the road to build a knowledge based economy. As part of the anticipated demonstrations, Ericsson will have a dedicated space for its partners to showcase their collaborations and different engagements with industry leaders and technology disruptors across various sectors. Among the innovative showcases, Ericsson will also showcase its newest products in 5G innovation, the Time-Critical Communication (TCC), a software toolbox built to resolving lags and interruptions in mobile networks. LEAP 22 is a global technological event featuring more than 400 expert international speakers across six conferences delivering expert insights and cutting-edge content. Ericsson enables communications service providers to capture the full value of connectivity. The company’s portfolio spans the business areas Networks, Digital Services, Managed Services and Emerging Business. It is designed to help our customers go digital, increase efficiency, and find new revenue streams. Ericsson’s innovation investments have delivered the benefits of mobility and mobile broadband to billions of people globally. Ericsson stock is listed on Nasdaq Stockholm and on Nasdaq New York. Ericsson is a provider of Information and Communication Technology (ICT) to service providers. We enable the full value of connectivity by creating game-changing technology and services that are easy to use, adopt, and scale, making our customers successful in a fully connected world.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Ericsson to showcase 5G and technologies at LEAP Read More »

Eagle Eye Networks

Eagle Eye Networks direct-to-cloud body camera

Eagle Eye Networks, a global provider in cloud video surveillance, introduced the first-of-its-kind 4G, direct-to-cloud body camera designed specifically for commercial use. This new offering provides commercial customers with affordable access to feature-rich, professional-grade body camera services, which improve staff safety and accountability, trigger immediate response, and provide valuable evidence, all while protecting assets and keeping communities safe. Eagle Eye Body Cameras are now available for order with delivery in Q3. Body cameras dissuade aggression, improve accountability, and reduce false accusations. Employees from private security guards to retail staff, in-home service providers, and delivery workers feel safer and more valued when wearing body cameras. Global research organisation Omdia has identified body cameras in non-law enforcement applications as a top trend in 2021, saying the potential addressable market for commercial body-worn cameras dwarfs that of law enforcement. In the US alone, Omdia estimates private security guards outnumber police officers 2-to-1, and says new commercial body camera users – in retail, for example – are rapidly emerging. “The commercial body-worn camera market is ripe for new entrants,” said Paul Bremner, Principal Analyst in Omdia’s critical communications group. “Features such as cloud connectivity, 4G, live streaming, GPS, and price, are important to retailers, delivery services, guards, and others in the commercial sector. New body cam providers who can break the old law enforcement body camera mold with reasonably priced, feature-rich, professional-grade body cameras are positioning themselves to fill a growing need the commercial market is searching for,” Bremner said. Resellers are welcoming the arrival of body cameras that meet their needs. Jaime Abad Valdenebro, Chief Executive Officer at OmniCloud, said he is excited that Eagle Eye Networks is launching commercial body camera support to its Eagle Eye CameraManager platform. “Fixed IP cameras integrated with 4G-enabled body cameras represent the extension of video cloud services in a real mobile environment, providing a new disruptive video surveillance solution,” Valdenebro said. “In a smart city application, Eagle Eye’s new 4G, direct-to-cloud body cams will provide extra protection for security guards and ensure patrols are completed on time. The 4G is important, because it gives the user live access to body camera video. It will make a high performance true cloud video surveillance system even more powerful,” he added. With Eagle Eye Body Cameras, users can: • Use 4G or Wi-Fi for live streaming, real-time remote viewing, and direct to cloud recording • Blend fixed, mobile, and body-worn cameras, making it easier for your entire surveillance system to work together • Stream to a monitoring or security operations center and use geo-tagging for immediate response and support • Experience a larger viewing area with fisheye capabilities that are dewarped in the Eagle Eye Cloud Management Application • Manage a large number of cameras in the cloud and watch from a control room • Use two-way audio to clearly communicate • Protect your people at work and in the community • Future-proof your investment with hardened cameras that offer “law enforcement-level” durability and quality at an affordable price • Gain flexibility for live streaming and video retrieval during docking with rapid recharge capabilities   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Eagle Eye Networks direct-to-cloud body camera Read More »

anti-terrorism

Midlands firm completes anti-terrorism scheme

A seaside resort on the Gold Coast in Australia has seen hundreds of anti-terrorist bollards installed as part of a major project by Coventry-based Safetyflex Barriers. Installation of Safetyflex’s Truckstopper anti-terrorist security bollards and crash-rated street furniture has been carried out along Surfers Paradise. Given it is a popular tourist destination with upwards of 10 million visitors each year, local Government highlighted a need to apply measures to protect the public in high foot traffic areas. The bollards provide a resolute hostile vehicle mitigation scheme (HVM) with Safetyflex’s slim-line oval shroud to ensure they blend well with the local area. Marcus Gerrard, Director at Safetyflex, said “This high-quality, cost-effective solution is amongst our most popular products with overseas clients due to its slim-line aesthetic appearance and shallow foundation which utilises our military-grade patented steel technology, to help to keep shipping costs low. “Due to the ease of installation, these types of bollards are favoured for public realm products as they only require a simple shallow foundation, meaning less dirt-away and less disruption to public footpaths and walkways, but most off all for the award-winning aesthetic look of the oval bollards. “In partnership with our distributor Ezi Security, Safetyflex products are now keeping people safe in hundreds of locations right across Australia and we are pleased Surfers Paradise is now among them.” Since the 2017 vehicle attacks at Bourke Street Mall in Melbourne, Australia’s HVM supplier, Ezi Security and Safetyflex products have been key in implementing HVM schemes to protect the public from similar attacks. Safetyflex is now one of the biggest suppliers of anti-terrorist bollards in Australia, with previous work including securing one of the busiest railway stations in Sydney, two of Brisbane’s most popular tourist attractions, and East Police Station in Melbourne. The Truckstopper anti-terrorist security bollards and crash-rated street furniture installed in Surfers Paradise won Australian Product of the Year award at the Australian Security Industry Awards two years running, in 2017 and 2018. Safetyflex Barriers are part of the GME Springs group who have over 40 years experience in manufacturing suspension systems for the automotive, rail and MOD sectors. They have now put their experience of spring technology into the design and manufacture of Anti Terrorist Security Barriers and Bollards Rated to PAS68. Being BSI ISO9001 accredited, Safetyflex can be used in a wide range of industrial and commercial applications including road blockers and perimeter fencing, Industrial Security Safety Barriers, Car Park Barriers and Bollards. All of which help to protect premises, machinery, vehicles and most importantly people.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Midlands firm completes anti-terrorism scheme Read More »

Digital Barriers

Digital Barriers team up with Channel 4 hit series

Digital Barriers, a UK-Based provider of IoT surveillance and security technologies, announced that it is one of the technology providers used by the Channel 4 hit series ‘Hunted’ to give the hunters access to the latest cutting edge techniques. The show includes both a civilian and celebrity series where contestants try and evade capture from a team of expert hunters, usually former police, intelligence officers or armed forces. Using the company’s technology including live-streaming body worn cameras and cutting-edge AI analytics, the hunters have access to military-grade kit, designed to support field-based personnel that demand real-time and reliable video streaming – wherever the location. Commenting on the collaboration Zak Doffman, Digital Barriers CEO, said “We are delighted to be working with the Hunted team.  Pairing our unique video technology with their world class forensic skills is an unbeatable combination. We truly can deliver live video in situations where others can’t, turning our body worn cameras into a source of real-time intelligence wherever they are deployed.” “You’ll see them feature on-person as well as mounted as a dashcam in moving vehicles, which are common real-world applications. We are genuinely excited that viewers get to see our technology working live and in action, in such an iconic British series, and are even more pleased that its inclusion is able to add a completely new dimension to the forthcoming series.” Dave Sutton, Series Editor at Shine TV who produce the series added “We are always looking to give our Hunters the edge they need to succeed, and we believe that incorporating Digital Barriers’ technology in the forthcoming celebrity and civilian series has done just that.  The body worn cameras were especially instrumental, and really transformed how our HQ Hunters were able to monitor operations on the ground. They were a very welcome upgrade to what we have relied on before, playing a key role in every single capture moment, as well as many ‘near misses’ too, helping to make the series even more authentic.” Digital Barriers provides innovative public safety and security solutions to help organisations protect both people and places. With secure and reliable real-time visual and audio distribution from any location – even when network conditions are poor, we provide resilient comms in some of the most challenging operational environments from any connected device. This combined with cutting-edge video analytics software, including live facial recognition and intrusion detection, whilst streaming live across both fixed and cellular networks, provides organisations with a powerful surveillance tool for real-time situational awareness.   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Digital Barriers team up with Channel 4 hit series Read More »

Data Protection

Expert advice for Data Protection and Privacy Day

Data Protection Day as it’s marked across Europe, or Data Privacy Day, internationally, is an annual marker in a very challenging cybersecurity challenging calendar. Consumer data is regularly stolen, and enterprises and public sector organisations are often in the headlines because of incessant attacks from cybercriminals as well as from accidental privacy misadventures. All organisations find maintaining privacy and data protection best practises a challenge in this environment. With increasingly strong regulations levied from across many national and regional jurisdictions, staying on top of data privacy and protection is only ever becoming a bigger priority with high risks and penalties at stake. Five experts from across the enterprise technology space offer their opinions and advice for organisations of all sizes. From cybersecurity and password management to customer data, data analytics, and software development, these thought leaders have shared their experiences so you can benefit. Security starts with your teams – Rob Zuber, CTO, CircleCI “In today’s world, we use tools built by others, offering greater agility, allowing us to work faster and more efficiently. The caveat? It’s easier to lose sight of what is happening. Security is core to the software business and software is core to every business. Data security must be core to every business from the infrastructure and software layer upwards – and it starts with developers and their mind-set. “Leaders need to think about the security of their offerings at every point in the systems development lifecycle: From including security engineers from the design phase through to regular third-party audits of code libraries and service provider standards. With this greater traceability, developers are empowered to write, test, and measure those improvements using a Continuous Integration/Continuous Delivery platform, resulting in shorter lead times for developing features and bug fixes, as well as greater agility concerning changes in development priorities and market trends. “The bottom line is that your team is your most valuable set of security researchers. They know your applications best and must be the first line of security and data privacy defence, creating a secure foundation for the entire business.” Rob Zuber is the CTO of CircleCI, providing a platform for businesses to build software applications at speed and at scale. Rob has founded four startups and has been CTO at three. Privacy is a security issue, at heart – Drew Bagley, Vice President & Counsel, Privacy & Cyber Policy at CrowdStrike “Increasingly, privacy is not only a core social value but intertwined with technologies used in daily life. Although threats to privacy can take many forms, one of the greatest threats today comes in the form of data breaches. Consequently, modern privacy laws require holistic data protection in both privacy and cybersecurity. “The GDPR, California’s CCPA, Brazil’s LGPD, Japan’s APPI, and sector-focussed laws take common approaches to not only laying out rules of what organisations can do with data, but also make clear there are risk and impact based obligations to protect data against breaches and make appropriate notifications in the event of one.”   Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Expert advice for Data Protection and Privacy Day Read More »

Todd Research

Todd Research – Knowledge is power

Jason Wakefield, Sales Director at Todd Research: Many event managers and venue owners believe that simply deploying the correct security equipment will keep their staff and visitors safe. However, unfortunately that is not always enough. Operators of X-ray scanners need to know how to properly use a machine, and they must be able to recognise the difference between images of an electronic Christmas card and a potential threat – a skill that requires training. Todd Research, a provider in X-ray scanners, has therefore been offering operator tutorials for several years and, in response to customer demand, it recently added online courses to its services. Security equipment is constantly evolving; today’s X-ray scanners have unparalleled resolution and are supported by powerful software that helps flag suspicious items. However, advanced technology cannot replace knowledge, and even the best equipment won’t perform at its best if the operator doesn’t know how to use it. Todd Research understands that the security industry needs proper operator training, something that the company has been providing for several years. Historically, this was usually through face-to-face meetings, either in tandem with a maintenance visit or on request. However, in response to the current COVID situation, and to make training more accessible to remote clients, Todd Research has introduced two new online courses. These are aimed at operators of conveyor- or cabinet-type X-ray scanners and consist of four chapters. At the end of each section, the participants’ knowledge is evaluated to ensure that no valuable information has been missed. The training ends with a rigorous visual test checking their ability to spot dangerous items. No mistakes can be allowed, so only a 100 % score leads to a ‘pass’. While currently there are no rules regarding operator training, Todd Research continues to set extremely high standards, hoping that others will be inspired to do the same.   Founded in 1950, Todd Research has a history of designing, manufacturing and supplying X-ray scanners, metal detectors and blast suppression equipment across a diverse range of public and private market channels. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Todd Research – Knowledge is power Read More »

Biometrics

Biometrics – first step in Zero Trust strategies

Michel Roig, President, Head of Payments & Access at Fingerprint Cards discusses if biometrics can be the first step towards a Zero Trust strategy. Today’s enterprises are being challenged to stay one step ahead of security threats. Data shows that in 2021, the average cost of a data breach reached USD 4.24 million, up from USD 3.86 million in 2020 and the highest in 17 years. The surge in flexible and hybrid working arrangements (Working From Anywhere – WFA) is making an already challenging situation even more complex. Leaders now need to decide how to combine enterprise-level security with current working models. The timing could not be more critical. In 2021, the average cost of a data breach where WFA was a factor was a million dollars higher compared to non-WFA related breaches, and many organisations still need to adopt a stronger security strategy for cloud-data storage.   An important strategy attracting increasing attention is a Zero Trust approach to security. While organisations consider how to implement Zero Trust in their IT strategies, a first step could be to consider the role of biometric authentication for logical access control, throughout digital estates.   What is Zero Trust security? First conceptualised over a decade ago, Zero Trust is a security model that is deployed to mitigate the complexities of today’s agile and technology-driven workplaces.     Essentially, Zero Trust entails constant ID verification, assumes breaches all the time, and puts digital estates on a “never trust, always verify” footing across all its aspects: hardware, software, procedures, networks, databases, and humans.   One of the reasons Zero Trust has been attracting attention is because of its role in integrating the highly secure enterprise digital estates with less secure environments. For many organisations looking to level up their security to accommodate flexible working, this is a perfect solution as it throws up a hard security ‘shell’ around employees wherever and whenever they are working. This is a key factor as to why as many as three-quarters of organisations are looking to adopt Zero Trust.  Zero Trust is a broad approach, with several overlapping elements that create robust security throughout the digital estate. Among its key pillars supporting organisations: identity, endpoint, application, and infrastructure security, one binding technology that can help decision-makers to take the lead is biometric authentication. Getting Authentication right  As organisations develop plans to adopt Zero Trust, authenticating users that interact with digital estates is front of mind. The fresh thinking of Zero Trust brings an opportunity to migrate away from traditional authentication methods like PINs and passwords. The rationale is obvious. 80% of breaches and hacks can be attributed to compromised credentials, and 60% of people think there are too many passwords to remember. This is having a direct effect on attitudes towards password and PIN hygiene. 40% of us admit to reusing the same one across our personal and professional accounts, and many continue to still use highly predictable ones.      Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Biometrics – first step in Zero Trust strategies Read More »

Scroll to Top