All resources sponsored by:

HID

1 - 25 of 34 Matches
Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST:In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015
Get This Now


Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER:This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013
Get This Now


Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER:This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013
Get This Now


Global Authentication in Online Financial Services Leadership Award
sponsored by HID
WHITE PAPER:This white paper outlines a 6-step strategy to strengthening authentication to close vulnerabilities and mitigate advanced threats. Continue reading to learn the criteria authentication needs today to secure enterprise data.
Posted: 14 Aug 2015 | Published: 30 Dec 2014
Get This Now


An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER:This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014
Get This Now


Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY:This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013
Get This Now


One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER:This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013
Get This Now


Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY:This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013
Get This Now


Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY:This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013
Get This Now


6 Criterions for Strong Authentication
sponsored by HID
WHITE PAPER:This white paper presents a 6-step plan to ensure stronger authentication to go beyond basic password methods. Continue reading to learn how to craft a robust authentication strategy without sacrificing user convenience.
Posted: 22 Jul 2015 | Published: 07 Jan 2015
Get This Now


Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER:This white paper focuses on the importance of using a strong authentication method to protect your company from hackers and detrimental threats. Read on to learn of the benefits of a strong authentication solution, such as fraud detection and behavioral benefits, as well as the simplicity behind deploying and managing your security.
Posted: 22 Jul 2015 | Published: 20 Mar 2014
Get This Now


Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER:This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015
Get This Now


Identity and Access Management and Challenges
sponsored by HID
EGUIDE:Download and discover the essentials of identity and access management, and tips for tackling the five key challenges in managing identities and effective access control strategies.
Posted: 13 Jul 2015 | Published: 13 Jul 2015
Get This Now


ID and Access Management for Microsoft Applications
sponsored by HID
WHITE PAPER:This white paper outlines how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Read on to learn about how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015
Get This Now


Enabling a Secure and Convenient Online Banking Experience: How to effectively protect online banking data
sponsored by HID
WHITE PAPER:This white paper details how you can increase the security of online banking systems and comply with government mandates.
Posted: 06 Jul 2015 | Published: 06 Jul 2015
Get This Now


Case Study: Decreasing the Risk of Fraud in the Financial Services
sponsored by HID
CASE STUDY:Read this case study to discover how a financial services institution secured its online banking platform with strong authentication measures.
Posted: 02 Jul 2015 | Published: 25 Mar 2013
Get This Now


Comparing Authentication Security Devices
sponsored by HID
BROCHURE:Access this white paper to explore 10 different authentication devices and learn the strengths and benefits each one adds to your access security strategy. View now to compare these devices to find the ideal authentication approach for your organizations, security, and budget needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2013
Get This Now


Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER:This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013
Get This Now


Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER:This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014
Get This Now


Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER:This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015
Get This Now


Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO:This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013
Get This Now


Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID
VIDEO:This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013
Get This Now


Managing and Securing Identities
sponsored by HID
EGUIDE:This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015
Get This Now


Securing the Mobile-First Experience
sponsored by HID
RESOURCE:This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015
Get This Now


As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER:In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement