A Secure Internet Class
Proper Access Control Configuration starts with Access Control where the user is first Identified then Authenticated prior to granting entry.
EXISTENCE, as easy as
EXISTENCE, as easy as
1
Connect ExistenceID
Connect the ExistenceID to any internet connected device, such as a computer, laptop, tablet, or smart phone.
2
Login
Enter the credentials (i.e. password, PIN, face recognition, fingerprint, etc.) that the organization has decided to require as the data factor used. Proceed to interact securely.
3
Disconnect ExistenceID
When you have completed your activity, simply disconnect the ExistenceID from the device and the session will implode, leaving no evidence that the user conducted secure activity except at the secure environment.
