authentication

Results 326 - 350 of 367Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Apr 29, 2015
Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity. CISOs and IAM leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. Read this report why.
Tags : 
workforce, ciso, iam, mobile, workforce, security, it management
    
Okta
Published By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta, security, it management
    
Okta
Published By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : 
theft, research center, c-level, okta, theft research, security, it management
    
Okta
Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority, identity and authentication, authentication, identity management
    
VeriSign
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication, access control, biometrics, identity management, internet security, password management, phishing
    
Confident Technologies
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management, virtualization security, web services management, radiantone, virtual directories, sun directory substitution, migration, java, oracle, data integration, content management, virtualization
    
Radiant Logic, Inc
Published By: SPYRUS     Published Date: May 12, 2011
Why PKI authentication is more secure
Tags : 
securid, pki, authentication
    
SPYRUS
Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords, technology
    
Hitachi ID
Published By: Confident Technologies     Published Date: Jun 29, 2011
Two-factor, mobile authentication using images.
Tags : 
authentication, two-factor authentication, multifactor authentication, security, website security, technology
    
Confident Technologies
Published By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security
    
Symantec
Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management, virtualization, cloud computing, infrastructure
    
McAfee
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : 
holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device, it management, enterprise applications, data management, data center
    
Sponsored by HP and Intel®
Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
    
NETIQ
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Published By: SafeNet     Published Date: Jun 03, 2013
An effective strong authentication service enables companies to pursue a consistent authentication policy, across the organization, by automating and simplifying the deployment and management of a distributed estate of tokens.
Tags : 
authentication, authentication deployments, managing authentication
    
SafeNet
Published By: SafeNet     Published Date: Jun 04, 2013
This paper uncovers the key strategies that banks can employ in order to effectively and efficiently combat today's threats, and ensure identity and transaction security in eBanking.
Tags : 
ebanking, identity protection, transaction protection, authentication
    
SafeNet
Published By: Thawte     Published Date: Oct 05, 2015
Domain Validation (DV), Organisation Validation (OV) and Extended Validation (EV) SSL certificates offer completely different levels of authentication - but what does that mean? The right certificate for you depends on your business type and what you are using the certificate for. To discover which level of validation wins for your needs, download our quick reference guide now.
Tags : 
    
Thawte
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
    
MobileIron
Published By: Gigya     Published Date: Jun 08, 2015
As TV Everywhere (TVE) adoption rises alongside multi-device content consumption, media companies should look to revamp their engagement strategies. To engage with viewers across different devices, it’s important to have an in-depth understanding of how this process is spearheaded with user authentication, particularly via TVE.
Tags : 
tv everywhere, multi-device content consumption, engagement strategies, authentication process, tve benefits
    
Gigya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.