IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor AuthenticationReports
 
Best Practices for Preventing Identity Fraud
sponsored by iovation, Inc.
EGUIDE: This expert e-guide explains how to prevent identity fraud with unique device authentication, as well as several tools used to thwart online fraudsters.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

iovation, Inc.

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-in 2014 Vendor Assessment
sponsored by CA Technologies.
ASSESSMENT TOOL: Explore this study conducted by IDC that compares vendors in the IAM market, particularly catering to FSSO programs.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CA Technologies.

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BlackBerry

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014

HID

NEC Biometrics Solutions Podcast: Enhancing the customer experience and securing endpoints
sponsored by NEC Corporation of America
PODCAST: This podcast reveals a biometrics solution that will help identify fraud across various industries. NEC's NeoFace uses a highly accurate, fast and flexible facial recognition tool for authentication purposes.
Posted: 10 Oct 2014 | Premiered: Oct 2, 2014

NEC Corporation of America

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Establishing Trust in Online Identities
sponsored by HID
BROCHURE: Access this brochure to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement