off

Trusted Platform Module explained – What it is, what it does and what its benefits are

Introduction As security systems have transitioned into network devices over the last few decades, system vulnerabilities ahve transitioned as well. This shift in network utilisation brings with it far more vulnerabilities than compared to older analogue systems, and due to the...
off

Network Authentication – 802.1X Secure the Edge of the Network

Secure the edge of the network Security devices are mostly located at the physical edge of the network. Especially detection devices, such as cameras, are installed in places that are accessible by the public. As these devices are connected to the network, this also increases th...