Dieses Papier fasst zusammen, wie sich die Europäische Datenschutz-Grundverordnung (DSGVO) auf Geschäftsanwendungen auswirkt, und erläutert, wie Visual Guard die Einhaltung vereinfacht.
Dieses Papier fasst zusammen, wie sich die Europäische Datenschutz-Grundverordnung (DSGVO) auf Geschäftsanwendungen auswirkt, und erläutert, wie Visual Guard die Einhaltung vereinfacht.
How to manage fined-grain permissions in your business applications
This document looks at identity management and access control (IAM) inside applications. It contains recommendations for those in charge of conceiving access control systems, organizing access rights and administering applicative security on the long term.
Strategien für Authentifizierung und Berechtigungen (Role Based Access Control Dieses Dokument bietet Informationen für den Entwurf und die Umsetzung eines Systems zur rollenbasierten Zugriffssteuerung (Role Based Access Control, RBAC).
How to move information, in a way that is simple and intuitive, fostering business development, while at the same time ensuring an optimal level of security against repeated attacks on confidential data?
How a global leader in the metals and mining industry secured its factories worldwide with Visual Guard
How to comply with security standards for health care applications.
Why health care actors used Visual Guard to add new security features to their applications.
The peculiarities of SaaS and Multi-tenant Applications and how to handle Access Control within them.
Why YOU need to abide by the Principle of Least Privilege.
Most people remember to secure against external threats, but what about the security of internal data in your applications?
How do you balance the access your users need with your company's resources?
How to simplify user management in your applications
What you need to take into account to implement Single Sign-On across your applications.
Password fatigue is the phenomenon of feeling overwhelmed by the need to remember all of them. To combat this, many users have found coping strategies that undermine the security policies that the passwords were created to enforce.