authentication

Results 76 - 100 of 341Sort Results By: Published Date | Title | Company Name
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
Diligent
Published By: DocuSign     Published Date: Aug 16, 2016
In today’s fast-paced business environment, the legal department is often the bottleneck to faster execution. Procurement and Sales teams are demanding greater efficiency from the legal department to accelerate business relationships. Download this case study sampler to learn more about how DocuSign securely protects confidential information with multiple levels of authentication and how other companies have increased efficiency by utilizing DocuSign’s eSignature platform.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Aug 18, 2016
In today’s fast-paced business environment, the legal department is often the bottleneck to faster execution. Procurement and marketing teams are demanding greater efficiency from the legal department to accelerate their business relationships. Download this brief to learn more about how DocuSign can help you empower your internal clients, improve the speed of contract execution, and securely protect confidential information with multiple levels of authentication.
Tags : 
docusign, digital, digital transaction management, efficiency, paper cost
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
In today’s fast-paced business environment, the legal department is often the bottleneck to faster execution. Procurement and marketing teams are demanding greater efficiency from the legal department to accelerate their business relationships. Download this brief to learn more about how DocuSign can help you empower your internal clients, improve the speed of contract execution, and securely protect confidential information with multiple levels of authentication.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
In today’s fast-paced business environment, the legal department is often the bottleneck to faster execution. Procurement and Sales teams are demanding greater efficiency from the legal department to accelerate business relationships. Download this case study sampler to learn more about how DocuSign securely protects confidential information with multiple levels of authentication and how other companies have increased efficiency by utilizing DocuSign’s eSignature platform.
Tags : 
    
DocuSign
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
Published By: Dyn     Published Date: Sep 25, 2013
Domain-based Message Authentication, Reporting & Conformance (DMARC) has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name. Read this whitepaper to learn the importance of DMARC and what it does for you.
Tags : 
dmarc, domain based message authentication, reporting comfirmation, authenticate sends, isp, internet service provider, dyn, network security, authentication, email security, phishing, secure content management
    
Dyn
Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email, inbox, spam, dkm, engagement
    
EmailDirect
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security, online security, phishing, security management, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam, authentication, compliance, password management, security management, best practices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust, encryption
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone, authentication, encryption, bluetooth, mobile data systems, mobile workers, pda
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication, software development
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : 
entrust, homeland security, frac, identification standards, first responder, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance
Tags : 
entrust, healthcare, cms systems, medicare, medicaid, it management, knowledge management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.