All resources sponsored by:

HID

18 Matches
Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER:Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
Get This Now


Important Modern Trends in Digital Banking
sponsored by HID
WHITE PAPER:Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016
Get This Now


Banking Security in Today's Mobile World
sponsored by HID
RESOURCE:This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.
Posted: 30 Nov 2016 | Published: 30 Sep 2016
Get This Now


Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER:With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016
Get This Now


Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER:How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016
Get This Now


Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK:This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015
Get This Now


The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER:In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015
Get This Now


Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER:This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013
Get This Now


ID and Access Management: Authentication Simplified
sponsored by HID
WHITE PAPER:Discover how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Learn how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015
Get This Now


Securing the Mobile-First Experience
sponsored by HID
RESOURCE:This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015
Get This Now


As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER:In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015
Get This Now


Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER:Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014
Get This Now


Real-Time Protection to Reduce Risk for Financial Institutions and Banking Customers
sponsored by HID
WHITE PAPER:Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014
Get This Now


Authentication Best Practices: On and Off the Cloud
sponsored by HID
EGUIDE:Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 12 Oct 2016 | Published: 12 Oct 2016
Get This Now


Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY:This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013
Get This Now


ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE:In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013
Get This Now


HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST:This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013
Get This Now


Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER:In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
Get This Now


18 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement