Jump to content

Talk:Identity-based security

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Serge10duke (talk | contribs) at 12:08, 4 April 2017 (The article needs complete rewriting: Reformulation.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The article needs complete rewriting

At this stage the article looks very much like an advertorial for Cyberoam.

Identity-based security is not:

Also, identity-based security is not just:

  • a security approach which includes security components that provides visibility and control over user activity in a particular network, but rather a method of controlling access to a digital product or location based on the authenticated identity of an individual.

While it's true that it's often the case that the concept of identity-based security is used in connection with network security (Cisco (PDF), Aruba Networks (PDF), Palo Alto Networks etc.), it can be used with digital products as well.