IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
3 Factor Authentication Reports
 
Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Corporation

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and IntelĀ®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and IntelĀ®

One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013

HID

Putting the UX Into VPN
sponsored by BlackBerry
WHITE PAPER: This white paper explores the challenges associated with current VPN technology and the need for a better solution. Read on to discover a VPN authentication platform designed to give customers a simplified, more secure VPN.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

A Faster, More Effective Way to Manage Authentication Deployments
sponsored by SafeNet, Inc.
WHITE PAPER: Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014

HID

Strengthen Security with Intelligent Identity and Access Management
sponsored by IBM
WHITE PAPER: View this white paper to learn how to control user access to sensitive assets and monitor their actions after they gain access.
Posted: 02 Mar 2015 | Published: 09 Apr 2014

IBM

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement