Security Best Practices
ActivID AS provides a high level of security assurance for network resources and personal identities. Established security processes ensure the confidentiality, integrity, and availability of keys, secrets, and other sensitive, identity-related information. Only people who have been assigned specific roles and who are enrolled as system operators, can access, manage, or use information.
Deploying and maintaining a secure system involves a sustained effort that requires Information Technology security expertise and cooperation between IT professionals and other network and technical staff. Such cooperation ensures the correct execution and maintenance of security measures.
The important security recommendations to counter threats to ActivID AS security objectives are a result of extensive experience with customer deployments in many network environments, including networks in the financial, enterprise, and government arenas.
If organizations adhere to the recommendations, then they will protect themselves against a number of threats.
However, these recommendations do not guarantee that ActivID AS and related software solutions (and the assets they protect) are fully and permanently secured.
Topics in this section:
See also: