Talk:Identity-based security
Appearance
This is the talk page for discussing improvements to the Identity-based security article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
The article needs complete rewriting
At this stage the article looks very much like an advertorial for Cyberoam.
Identity-based security is not:
- a [Cyberoam] patented network security approach, but it can be a security model or framework, or an architecture, among other things.
- a security approach put forward by Cyberoam, as it precedes Cyberoam's solution.
Also, identity-based security is not just:
- a security approach which includes security components that provides visibility and control over user activity in a particular network, but rather a method of controlling access to a digital product or location based on the authenticated identity of an individual.
While it's true that it's often the case that the concept of identity-based security is used in connection with network security (Cisco (PDF), Aruba Networks (PDF), Palo Alto Networks etc.), it can be used with digital products as well.