Uniloc Delivers System Fingerprint

"Until now, most network security consisted of a combination of user names and passwords. We all know how secure those can be," says Paul Miller, chief marketing officer with Uniloc. "Then there are the security tokens and ID cards that can add extra security, but also add cost."

According to Miller, WebAnchor takes a snapshot of the edge system's hardware and software configuration and uses that as the user's security token. "Other security systems will record three or four NIC or MAC addresses

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

Sorry, our subscription options are not loading right now

Please try again later. Get in touch with our customer services team if this issue persists.

New to Waterstechnology? View our subscription options

Register for free

Access two articles, our IMD and Waters Wraps, plus a member newsletter. Find out more.

All fields are mandatory unless otherwise highlighted.

Most read articles loading...

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here