All resources sponsored by:

HID

16 Matches
Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK:This e-book describes the security landscape for mobile devices and how near field communications can improve the user experience on mobile devices while allowing companies to protect their assets and manage costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015
Get This Now


The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER:In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015
Get This Now


vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER:With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015
Get This Now


Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER:This white paper explores the effectiveness of real-time malware protection for financial institutions and banking customers. View now and see how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016
Get This Now


Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER:This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013
Get This Now


Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER:This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013
Get This Now


ID and Access Management for Microsoft Applications
sponsored by HID
WHITE PAPER:Discover how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Learn how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015
Get This Now


Securing the Mobile-First Experience
sponsored by HID
RESOURCE:This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015
Get This Now


As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER:In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015
Get This Now


Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER:Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014
Get This Now


Protecting your Customers’ Online Banking Transactions
sponsored by HID
WHITE PAPER:Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014
Get This Now


Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets
sponsored by HID
WHITE PAPER:Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014
Get This Now


Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY:This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013
Get This Now


ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE:In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013
Get This Now


HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST:This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013
Get This Now


Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER:In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
Get This Now


16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement