Talk:Identity-based security
Appearance
The article needs complete rewriting
At this stage the article looks very much like an advertorial for Cyberoam.
Identity-based security is not:
- a [Cyberoam] patented network security approach, but it can be a security model or framework, or an architecture, among other things.
- a security approach put forward by Cyberoam, as it precedes Cyberoam's solution.
Also, identity-based security is not just:
- a security approach which includes security components that provides visibility and control over user activity in a particular network, but rather a method of controlling access to a digital product or location based on the authenticated identity of an individual based on a number of constraints such as company, device, location and application type.
While it's true that it's often the case that the concept of identity-based security is used in connection with network security (Cisco (PDF), Aruba Networks (PDF), Palo Alto Networks etc.), it can be used with digital products as well.