SlideShare a Scribd company logo
1 of 1
Download to read offline
What is Context Aware Security?
Context Aware security is a branch of information security that uses
situational information to make decisions related to information access.
How Context Aware Security Works?
It understands the who, what, when, where, and why of access
requests to allow or deny information access.
Some factors used by Context Aware Security are:
Browser Used: Conducts historical analysis of
browser used to demand access & alerts if it falls
outside of normal user behavior.
Location: It detects if any requests are made from
abnormal locations and prevents access initiated from
geographies known to foster malicious activity.
Time: Denies requests made outside the customary
times & days of the users.
Blacklist: Prohibits access to the forbidden networks
or addresses.
Whitelist: Authorizes access requests based on a list
of approved networks or network addresses.
05
01
02
03
04
www.centextech.com
Centex Technologies
13355 Noel Road,
Suite # 1100, Dallas, TX 75240
Phone: (972) 375 - 9654
501 N. 4th Street,
Killeen, TX 76541
Phone: (254) 213 - 4740
1201 Peachtree St NE,
Suite 200, Atlanta, GA 30361
Phone: (404) 994 - 5074
Capital Factory, 701, Brazos
Street, Austin, TX 78701
Phone: (512) 956 - 5454

More Related Content

Similar to What is Context Aware Security?

1 introit security
1 introit security1 introit security
1 introit securityricharddxd
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxAnanthReddy38
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdfDr. Shivashankar
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfannaielectronicsvill
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
network security
network securitynetwork security
network securitynandita0798
 

Similar to What is Context Aware Security? (20)

Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
1 introit security
1 introit security1 introit security
1 introit security
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
network security
network securitynetwork security
network security
 

More from Centextech

Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)Centextech
 
Content Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data ProtectionContent Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data ProtectionCentextech
 
Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)Centextech
 
Security at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design PrinciplesSecurity at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design PrinciplesCentextech
 
CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:Centextech
 
Upgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise NetworksUpgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise NetworksCentextech
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCentextech
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCentextech
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart CardsCentextech
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Centextech
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT DevicesCentextech
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks Centextech
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyCentextech
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security StrategyCentextech
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsCentextech
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber SecurityCentextech
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?Centextech
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response PlanCentextech
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For BusinessesCentextech
 
What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?Centextech
 

More from Centextech (20)

Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)
 
Content Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data ProtectionContent Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data Protection
 
Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)
 
Security at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design PrinciplesSecurity at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design Principles
 
CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:
 
Upgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise NetworksUpgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise Networks
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized Businesses
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart Cards
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT Devices
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management Efficiency
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber Threats
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber Security
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response Plan
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For Businesses
 
What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?
 

Recently uploaded

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 

Recently uploaded (20)

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 

What is Context Aware Security?

  • 1. What is Context Aware Security? Context Aware security is a branch of information security that uses situational information to make decisions related to information access. How Context Aware Security Works? It understands the who, what, when, where, and why of access requests to allow or deny information access. Some factors used by Context Aware Security are: Browser Used: Conducts historical analysis of browser used to demand access & alerts if it falls outside of normal user behavior. Location: It detects if any requests are made from abnormal locations and prevents access initiated from geographies known to foster malicious activity. Time: Denies requests made outside the customary times & days of the users. Blacklist: Prohibits access to the forbidden networks or addresses. Whitelist: Authorizes access requests based on a list of approved networks or network addresses. 05 01 02 03 04 www.centextech.com Centex Technologies 13355 Noel Road, Suite # 1100, Dallas, TX 75240 Phone: (972) 375 - 9654 501 N. 4th Street, Killeen, TX 76541 Phone: (254) 213 - 4740 1201 Peachtree St NE, Suite 200, Atlanta, GA 30361 Phone: (404) 994 - 5074 Capital Factory, 701, Brazos Street, Austin, TX 78701 Phone: (512) 956 - 5454