Guide: The IT manager’s cheat sheet
Would you like to get ahead of security issues? Security threats are constantly developing, as cyber criminals come up with new and more sophisticated methods to hack into systems and steal data or identities. This guide helps you to get ahead of security issues.
E-book: The state of IT security 2018 – data and insights
There are several challenges within IT Security which IT managers will face 2018.
Guide: Read the complimentary Gartner report “Market Guide for User Authentication”
Nexus has been recognized by the independent technology research and advisory firm Gartner in the 2017 Market Guide for User Authentication. Nexus stakeholders can use the report to choose the right authentication solution for their organization.
Whitepaper: How to implement two-factor authentication (2FA) to Office 365 with Nexus Personal Mobile
This whitepaper goes through the wide range of 2FA solutions available, and the importance of choosing a solution that lives up to basic requirements.
Show all guides
“This is why we chose Nexus to protect the SWIFT platform”
Interbank communication network SWIFT needs its local software installations to be protected with reliable and user-friendly two-factor authentication (2FA). “We have achieved excellent results by implementing the Nexus authentication solution. It covers both current and future demands,” says Kirill B. Lebedev, CEO of the Russian IT security company Power Security.
This is how biometric access cards work
With biometric access cards, the cardholder’s fingerprints are registered directly on the card. This way, each card is linked to a specific person. When the user enters the workplace, the card’s biometrics must match the person using the card. The card is also encoded with RFID technology (Radio-Frequency Identification)
Why you should choose cards with the new technology MIFARE DESFire EV2
MIFARE is a technology used in cards and other access products. Many organizations use technologies such as MIFARE Classic, MIFARE Plus or the latest MIFARE development DESFire EV2, ensuring the safest solution for entering and exiting offices, warehouses, stores, airports and public buildings.
How to protect your debit card with an RFID Shield
The risk of skimming has increased as more and more stores have begun introducing so-called contactless cards as payment methods. The reason why companies focus on contactless cards is that they speed up the payment process, as the cards do not require a pin at the card terminal. Instead, it is sufficient to hold the card next to the payment terminal for the transaction to go through.
Manage employee identities and access rights with a single click
Access, both digital and physical, is a topic I have spent a lot of time discussing with customers and industry experts, yet I still find it a struggle to explain it to my kids or parents. The technical terms, the shorthand that makes sense at a conference or in an industry insiders’ conversation, mean nothing to them. It’s no surprise then that such insider talk means little to any business whose main focus is, well, another business than security by better identities.
The big car makers are taking 5G telecoms into a head-to-head with the US government’s homebred DSRC (WiFi based) technology
Interesting article in today’s Wall Street Journal. The big car makers are taking 5G (next gen) telecoms into a head-to-head with the US government’s homebred DSRC (WiFi based) technology. One, or perhaps even both of these, will define the future for connected vehicles in North America and globally. This makes for a high octane Internet of Things (IoT) race.
Show all blog posts