Jump to content

Talk:Identity-based security

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Serge10duke (talk | contribs) at 09:36, 4 April 2017 (A a very short critique of using the general concept of "identity-based security" to describe a specific system created by a company.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

The article needs complete rewriting

At this stage the article looks very much like an advertorial for Cyberoam.

Identity-based security is not:

Also, identity-based security is not just:

  • a security approach which includes security components that provides visibility and control over user activity in a particular network, but rather a method of controlling access to a digital product or location based on the authenticated identity of an individual based on a number of constraints such as company, device, location and application type.

While it's true that it's often the case that the concept of identity-based security is used in connection with network security (Cisco (PDF), Aruba Networks (PDF), Palo Alto Networks etc.), it can be used with digital products as well.