Identity and access management at the application are finally getting the attention that they deserve, but they are not new embedded computer concepts. With a growing importance on stronger authentication, cloud providers need to increase the number of authentication factors they consider. The typical two-factor authentication approach – typically a Common Access Card (CAC) in embedded computer – is not enough; they need to add additional factors based on the risk associated with certain data. We are focusing on ‘fine-grained entitlements’ in applications and how to secure everything with a lot of fidelity at the application level and data level. This also includes new approaches and technologies to securing data at rest.”
沒有留言:
張貼留言