I tried to discuss about “perimeter authentication” in one extra part of IT-Security’s blogs, because this authentication’s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other. Generally, we discussed about perimeter authentication, if a remote user requires an asserted identity […]
-
Blog about Digital Transformation, BI & Big Data, Cloud & Infrastructure, Software Development, BPM & Integration. Powered by OPITZ CONSULTING
-
Neue Beiträge
Archive
Meta