Identification, Authentication, and Authorization
Unauthorized access to sensitive data is one of the most serious risk that organizations face. More than ever, strong identification, authentication and authorization are requiered to deal with this risk.