by GoldKey | Apr 22, 2014 | blog
Authenticating a user on the network or over the Internet is one of the cornerstones of all security systems. Traditionally, authentication has been accomplished by asking for a username and password. In spite of the fact that this simplistic approach has been...
by GoldKey | Mar 21, 2013 | blog
Effective September 30, 2013, Advanced Authentication is required of all law enforcement personnel accessing CJIS, a computerized information system that is for the FBI’s National Crime Information Center. CJIS provides state, local, and Federal law enforcement and...
by GoldKey | Apr 27, 2012 | blog
A year ago, Neil Rubenking, the lead analyst for security at PC Magazine, did a review of GoldKey, giving it a very good Four Star Rating. That put us in a tie with the very best of the other security token products on the market. We decided that was not good enough....