- Adapts to the user and does not interfere with the normal work flow.
- Enables workstations to be secure even after the user has logged on to the system.
- Your behavior is unique and very difficult, if not impossible to copy.
12th - 13th May 2015, Hilton Tower Bridge, London
15th - 16th June T13 HUB, Belfast
14th - 15th Sept 2015, Berystede Hotel, Ascot, UK
6th - 7th October UCSF Mission Bay Conference Center, San Francisco