IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor Authentication Multimedia (View All Report Types)
 
What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc.
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 04 Sep 2015 | Premiered: 20 Jan 2015

Dell, Inc.

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Trusted Computing: Establishing Device Authentication
sponsored by Wave Systems Corp.
VIDEOCAST: View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement