IT Management  >   Systems Operations  >   Security  >   AAA  >  

Two-factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account. Fingerprint payment, based on fingerscanning, is the most common biometric payment method. Often, the system uses two-factor authentication, in which the finger scan takes the place of the card swipe and the user types in a PIN (personal  … 
Definition continues below.
Two-factor AuthenticationWhite Papers (View All Report Types)
 
802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

Move Forward With Mobile and Cloud, Securely
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


Establishing Trust in Online Identities
sponsored by HID
WHITE PAPER: Access this white paper to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

Bring Distributed Environments Under Control with Desktop Virtualization
sponsored by Dell and Microsoft
WHITE PAPER: This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security.
Posted: 17 Mar 2014 | Published: 18 Nov 2013

Dell and Microsoft

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
TWO-FACTOR AUTHENTICATION DEFINITION (continued): …  ID number) as usual. Here's an example of how one fingerprint payment system works:The shopper registers for a biometric program at a store kiosk by presenting valid identification and bank account information. The shopper scans his index finger using the kiosk's fingerscan reader. The store's fingerscan reader encrypts multiple point-to-point measurements of the fingerprint and stores the customer's biometric data and banking information in a centralized database. The shopper now has the option of selecting biometric payment at the point of sale register. If he chooses biometric payment, … 
Two-factor Authentication definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement