IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor AuthenticationReports
 
Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Exercising Control Over Mobile Access
sponsored by Aruba Networks
EGUIDE: In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

Aruba Networks

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secures employee remote access. Read on to find out why this retailer chose HID Global over other vendors due to the strong authentication characteristics behind it.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST: This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

Best Practices for Preventing Identity Fraud
sponsored by iovation, Inc.
EGUIDE: This expert e-guide explains how to prevent identity fraud with unique device authentication, as well as several tools used to thwart online fraudsters.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

iovation, Inc.

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement