sponsored by CA Technologies.
Premiered:  Jun 30, 2011, 10:00 EDT (14:00 GMT)
Format:  Video
Type:  Webcast
Language:  English

Hardware tokens were a popular method of strong authentication in past years but the cumbersome provisioning and distribution tasks, high support requirements and replacement costs have limited their growth. The additional log-in steps that hardware tokens require and the resulting user frustrations have limited adoption and make them impractical for larger scale partner and customer applications. 

Now there is now a unique software credential that can provide the security that you need in a transparent manner that makes employees, partners and customers more secure. This credential is flexible enough to be used on PCs, laptops, iPads, and mobile phones.  

In this webcast, you’ll learn the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.

Access Control | Authentication | Identity Management | Password Management | Security Hardware | Security Software | Security Tokens

View All Resources sponsored by CA Technologies.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement