ThinOX: the secure operating system that optimizes endpoints’ IT management
In the current corporate organizational context of whatever ...
Use case: authentication with FIDO2 to Citrix cloud via Microsoft Entra ID
“Account Takeover” or ATO (illegitimate account takeover) fraud is ...
Praim: secure and effective user authentication with FIDO2
The centrality that digital systems now play in ...
Agile: optimal user experience in Wi-Fi use
As the name suggests, Agile software was born ...
How Conforama Italia stores work with optimized and functional workstations
With a simple and rapid implementation, the furniture ...
ThinMan Gateway: an overview of its features
Sometimes, as we know, we technicians are masters ...
Choosing, installing and customizing ThinMan Gateway
One of the headaches that the IT department ...