IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
3 Factor Authentication White Papers (View All Report Types)
 
Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

How IT Can Help Businesses Streamline Vendor/Supplier Contracts Processes
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Identity is the Center of Always-On Connectivity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines the advantages organizations stand to gain by using an identity and access management platform to federate access control across all applications and create a centralized view of all your users' information, allowing you to dramatically improve your customer experience.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement