News

Product and market information on the topics of threats, security and remote access VPN.

Page 3 of 18

Business users are often unaware that even the supposedly secure MFA does not offer 100% p…

Employee devices should not be underestimated in information security, as they usually con…

Two-factor authentication is many times more secure than classic login method with a usern…

A solid cyber resilience strategy can help companies not only when they are hacked, but al…

[Translate to English:]

Authentication, verification and authorization are three closely related terms in IT secur…

Some companies are currently wondering whether the hype about cloud VPNs is justified or n…

Page 3 of 18