All resources sponsored by:

HID

10 Matches
Securing the Mobile Enterprise with 3 New Approaches
sponsored by HID
RESOURCE:This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 29 May 2015 | Published: 01 Apr 2015
Get This Now


Securing the Mobile-First Experience
sponsored by HID
RESOURCE:This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015
Get This Now


As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER:In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015
Get This Now


The Convergence of IT Security and Physical Access Control
sponsored by HID
WHITE PAPER:Read more on the challenges, deployment options and results associated with convergence of using a single credential to secure access to IT resources and physical access control.
Posted: 01 Aug 2014 | Published: 13 May 2014
Get This Now


Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER:Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014
Get This Now


Protecting your Customers’ Online Banking Transactions
sponsored by HID
WHITE PAPER:Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014
Get This Now


Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets
sponsored by HID
WHITE PAPER:Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014
Get This Now


ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE:In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013
Get This Now


HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST:This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013
Get This Now


Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER:In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement