Friday, October 15, 2021

NTT develops secure authentication method for Datacenters with Fath Mechatronics, peaq

Must Read

Microsoft joins Space ISAC as a founding member to support cybersecurity

The Space Information Sharing and Analysis Center (ISAC) welcomed its newest member, Microsoft, on June 23 with an announcement...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in...

UAE views Israel as a Tactical cybersecurity partner, says head of the national cyber authority

"We would like to know from Israel. You've built an extremely successful ecosystem that comprises the invention of technologies,...

NTT Global Data Centers EMEA has awakened with Fath Mechatronics and peaq to make a new sort of access control system for information centers.

The safety system unites Fath’s IoT hardware together with peaq’s blockchain established access management applications, a consent and access control system that leverages blockchain to increase cybersecurity and optimize accessibility management procedures.

NTT Global Data Centers EMEA has attracted FATH Mechatronics and peaq with each other to produce and incorporate a sophisticated access control option for data centers.

The safety solution unites FATH’s IoT hardware together with peaq’s blockchain established access management applications, a consent and access control system that leverages blockchain to increase cybersecurity and maximize access management procedures.

When an individual tries to obtain access via FATH’s TANlock, authentication information is created.

This can be delivered to peaq access management that then confirms or rejects consent to the access point by comparing the information with user rights saved. This entire procedure is processed and recorded on the blockchain in which it’s shielded from any sort of manipulation.

The outcome is a fully-GDPR compliant alternative that permits all server users and stands to be handled from 1 location with multi-factor authentication permanently listed on the blockchain.

This hugely reduces administrative expenses and makes auditing procedures prompt. The combo of all FATH Mechatronics’ IoT safety hardware and peaq’s blockchain technology applications is taking information center safety to new heights. We anticipate exploring next actions to always supply the highest safety standards to our clientele.”

With this alternative peaq and FATH Mechatronics remove the danger of hidden accessibility grants – considerably reducing the general threat of being endangered. It provides an unparalleled layer of safety to some access point it’s integrated with.

Interested businesses can conduct the solution in NTT’s Ltd.’s Technology Experience Laboratory in Frankfurt.

When a user tries to obtain access through the TANlock, authentication information is created.

This can be delivered to peaq access management that then confirms or rejects authorization into the access point by comparing the information with saved user rights.

The practice is processed and recorded to the blockchain in which it’s shielded from any type of manipulation, the companies explained.

NTT reported that the machine is fully-GDPR compliant so it’s been incorporated into its Tech Expertise Laboratory in Frankfurt, where interested businesses can check it out.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This