All resources sponsored by:

HID

1 - 25 of 34 Matches
Effective Access Control Strategies
sponsored by HID
EGUIDE:In this expert e-guide, get the answers you need for securing enterprise mobile access. Read on for several considerations surrounding two-factor mobile authentication, as well as effective access control strategies to protect a user's identity.
Posted: 11 Sep 2014 | Published: 11 Sep 2014
Get This Now


ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
BROCHURE:This brochure explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013
Get This Now


Figuring out FIDO
sponsored by HID
PODCAST:This expert podcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO Alliance.
Posted: 11 Aug 2014 | Premiered: Aug 6, 2014
Get This Now


Figuring Out FIDO
sponsored by HID
PRESENTATION TRANSCRIPT:This expert webcast transcript explains the benefits of following the FIDO standard for universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 08 Aug 2014 | Published: 06 Aug 2014
Get This Now


Multifactor Authentication Methods You Can Use Now
sponsored by HID
EGUIDE:While FIDO-ready technology is still developing, there are several multifactor authentication methods that are ready to use now.
Posted: 07 Aug 2014 | Published: 07 Aug 2014
Get This Now


Rising security concern for online and mobile banking
sponsored by HID
NEWSLETTER:This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014
Get This Now


One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST:This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014
Get This Now


Figuring out FIDO
sponsored by HID
WEBCAST:This expert webcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014
Get This Now


Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST:This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014
Get This Now


The Convergence of Physical and Logical Access
sponsored by HID
WEBCAST:This webcast explores the convergence of physical and logical access with a single access card, as well as managing and reporting through a single portal.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014
Get This Now


Password-Free Authentication: Figuring Out Fido
sponsored by HID
EGUIDE:This expert e-guide digs into the depths of the FIDO standards for authentication technologies and highlights your options for going password-free.
Posted: 05 Aug 2014 | Published: 05 Aug 2014
Get This Now


Spanish Engineering Organization Bridges Cost Savings with Business Efficiency Using HID Global’s Smart Card Solutions
sponsored by HID
CASE STUDY:This case study explains how a Spanish engineering organization used a smart card solution to overcome the obstacles of access control.
Posted: 05 Aug 2014 | Published: 25 Mar 2013
Get This Now


One campus card for Educational Institutions
sponsored by HID
WHITE PAPER:Click through to this white paper to discover the advantages of implementing a single campus card, including various security benefits to protect college campuses.
Posted: 05 Aug 2014 | Published: 12 Jun 2014
Get This Now


KAS BANK Discovers a Better Way to Secure High-value Transactions
sponsored by HID
CASE STUDY:This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a solution that delivered the highest level of security with a reusable infrastructure.
Posted: 04 Aug 2014 | Published: 25 Mar 2013
Get This Now


European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions
sponsored by HID
CASE STUDY:This case study examines how a London-based mobile communications retailer secures employee remote access. Read on to find out why this retailer chose HID Global over other vendors due to the strong authentication characteristics behind it.
Posted: 04 Aug 2014 | Published: 25 Mar 2013
Get This Now


The Convergence of IT Security and Physical Access Control
sponsored by HID
WHITE PAPER:Read more on the challenges, deployment options and results associated with convergence of using a single credential to secure access to IT resources and physical access control.
Posted: 01 Aug 2014 | Published: 13 May 2014
Get This Now


Co-operative Financial Services
sponsored by HID
CASE STUDY:Explore this case study to learn how a financial services organization in the UK implemented a solution to address identity and access issues.
Posted: 31 Jul 2014 | Published: 25 Mar 2013
Get This Now


Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER:Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014
Get This Now


Simple Steps to Prevent Data Theft
sponsored by HID
RESOURCE:This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Posted: 29 Jul 2014 | Published: 26 Jun 2014
Get This Now


Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER:Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014
Get This Now


One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER:In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014
Get This Now


ActivID® Threat Detection Service
sponsored by HID
DATA SHEET:Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013
Get This Now


Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY:In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013
Get This Now


Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER:Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014
Get This Now


Providing a single source for secure identity solutions
sponsored by HID
BROCHURE:Access this brochure to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement