. . . "Companies deploying access to sensitive resources to their employees, such as mail and documents, may need to protect access to their assets with a priori authentication and insure confidentiality." . .