IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
3 Factor Authentication White Papers (View All Report Types)
In What Circumstances are Malaysians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Malaysia and revealed how Malaysians are willing to give up some sensitive personal information in return for increased security. What other circumstances are they willing to provide biometric info to verify identities in airports? Download today and find out the facts.
Posted: 30 Sep 2015 | Published: 16 Sep 2015


Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013


A Buyer’s Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Protecting and Preserving Archived Files
sponsored by Imation Corp.
WHITE PAPER: Access this white paper to learn how you can authenticate data and prevent file corruption for your archived data.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Imation Corp.

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012


How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010


Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement