All resources sponsored by:

Gemalto

13 Matches
Strong Authentication for Secure Employee Access
sponsored by Gemalto
WHITE PAPER:This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015
Get This Now


Strong Authentication: Securing Identities and Enabling Productivity
sponsored by Gemalto
WHITE PAPER:Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015
Get This Now


A Faster, More Effective Way to Manage Authentication Deployments
sponsored by Gemalto
WHITE PAPER:Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015
Get This Now


IAM and Authentication Trends in 2015
sponsored by Gemalto
WEBCAST:This webcast takes into consideration the forces of the cloud, mobility, and user identity, and the way these forces are impacting IAM. The complex challenges created by these trends and what steps can be taken to overcome them are discussed.
Posted: 20 Aug 2015 | Premiered: Mar 24, 2015
Get This Now


Steer Your Enterprise Towards Smooth Mobility
sponsored by Gemalto
WHITE PAPER:This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015
Get This Now


How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by Gemalto
CASE STUDY:This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015
Get This Now


Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by Gemalto
WHITE PAPER:This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Business Drivers for Next Generation Authentication
sponsored by Gemalto
WHITE PAPER:This white paper discusses how today's complex authentication environment impacts users and IT professionals alike, and how you can lessen these impacts without lessening security.
Posted: 14 Aug 2015 | Published: 31 Dec 2014
Get This Now


Keys to Balancing Security and Convenience
sponsored by Gemalto
WHITE PAPER:This paper examines why the need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Posted: 14 Aug 2015 | Published: 14 Aug 2015
Get This Now


Brother Secures Employee Access and Reduces Costs with Cloud-based Authentication
sponsored by Gemalto
CASE STUDY:This case study reveals how using cloud based authentication helped one company secure employee access, while simultaneously lowering cost.
Posted: 14 Aug 2015 | Published: 14 Aug 2015
Get This Now


Physician Data Access without Sacrificing Patient Privacy
sponsored by Gemalto
CASE STUDY:In this white paper, you'll explore how one Dutch hospital system secured physician access to sensitive hospital resources while complying with patient privacy regulations through strong authentication.
Posted: 13 Aug 2015 | Published: 24 Jun 2015
Get This Now


Assessing the True Cost of Strong Authentication
sponsored by Gemalto
WHITE PAPER:In this white paper, you'll discover how to compare the TCO of on-site authentication vs. cloud-based authentication strategies to determine which is right for your budget. Access this resource now to review the hard costs and soft costs of each approach.
Posted: 12 Aug 2015 | Published: 23 Oct 2012
Get This Now


E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK:SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement