Category: Device Trust

Security Posture Verification

Security Posture Verification ensures that devices meet the minimum security requirements before being allowed to ...

Security Token

A Security Token is a peripheral device used to gain access to an electronically restricted resource. The token is ...

Single Sign-On (SSO)

A mechanism that allows users to authenticate once and gain seamless access to multiple web resources, improving ...

Trust Factor

A Trust Factor is an attribute (visible to end users on their devices) that is evaluated against admin-defined ...

Trust Profile

A Trust Profile in Banyan’s Command Center that applies admin-defined Trust Factors to a specific subset of ...

User Trust

User Trust is a core component of zero trust access, user authentication is dynamic and strictly enforced before ...

User Verification

User Verification ensures that only authorized users can access corporate resources. This includes implementing ...

Voice Over Internet Protocol (VOIP)

VOIP (Voice Over Internet Protocol) technology enables voice calls from a broadband Internet connection from ...

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a cybersecurity framework that assumes no implicit trust and requires continuous ...