Hardware  >   Security Hardware  >   Network Security Hardware  >  

Security Tokens

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authentication Tokens, Hardware Tokens, USB Security Tokens, Tokens
DEFINITION: A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification  … 
Definition continues below.
Security Tokens White Papers (View All Report Types)
1 - 25 of 38 Matches Previous Page  |  Next Page
Secure Identity Experience in the Age of Connected Everything
sponsored by HID
WHITE PAPER: Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.
Posted: 24 Mar 2017 | Published: 31 May 2016

HID

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

Top IT Trends in 2017: Cybersecurity
sponsored by Cisco and Dimension Data
WHITE PAPER: With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

5 Reasons Why Mobile Will Transform Enterprise Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Entrust, Inc.

The Rise of the Secure Internet Gateway
sponsored by Cisco and Dimension Data
WHITE PAPER: With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

5 Ways to Securely Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Discover what the digital transformation means to you, how you can capitalize on it, and how to keep your data secure in a future where borderless networks like the cloud and the connectivity of the IoT are bringing us closer together every day.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Entrust, Inc.

Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Encrypt Everything: How to Un-share and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements, while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

Dell SecureWorks

Secure Your Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure your email is protected against phishing attacks. Discover not only what to look for in threats coming in, but also how to tackle sophisticated email security challenges.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

How ransomware can hold your business hostage
sponsored by Dell SonicWALL
WHITE PAPER: Delve into the modern malware threat landscape and gain a detailed understanding of how malware targets your company, how it works, why traditional methods fail to protect against it, and how to mitigate your risk.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Dell SonicWALL

8 Best Practices To Prevent Your Data From Being Held Hostage
sponsored by Dell SonicWALL
WHITE PAPER: Discover 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.
1 - 25 of 38 Matches Previous Page    1 2    Next Page
 
SECURITY TOKENS DEFINITION (continued): … A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification number (PIN), which authorizes them as the owner of that particular device; the device then displays a number which uniquely identifies the user to the service, allowing them to log in. The identification number for each user is changed frequently, usually every five minutes or so. Unlike a password, a security token is a physical object. A key fob, for example, is practical and easy to carry, and thus, easy for the user to protect. Even if the key fob falls into the wrong hands, however, it can't be used to gain access because the PIN (which only the rightful user knows) is also needed.
Security Tokens definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement