Hardware  >   Security Hardware  >   Network Security Hardware  >  

Security Tokens

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authentication Tokens, Hardware Tokens, USB Security Tokens, Tokens
DEFINITION: A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification  … 
Definition continues below.
Security Tokens Reports
26 - 50 of 143 Matches Previous Page  |  Next Page
Keep Hires From Starting Fires: Risk Mitigation
sponsored by Veriato, Inc.
WHITE PAPER: Discover some common sense suggestions for improving the "beginning of the life cycle" risk mitigation process and reducing the exposure of your organization to possible insider threats.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

GPDR: How the Data Privacy Revolution Can Work For You
sponsored by Veritas
WHITE PAPER: Learn how the GDPR will affect your organization. Discover how to take advantage of the opportunity by taking a holistic view of information governance and turn the huge amount of unstructured backup data into available and usable information assets.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veritas

Security Recommendations: How to Simplify, Not Weaken, Your Passwords
sponsored by Specops Software
RESOURCE: Discover side-by-side requirements for password efficacy from Microsoft, the NIST, and PCI, as well as tips and recommendations on further reading.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Specops Software

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

Your In-Depth Guide to GDPR
sponsored by Oracle Corporation UK Ltd
WEBCAST: Gain an overview of what the key objectives of GDPR are, what it means for your organization, and what impact it will have on your business.
Posted: 13 Apr 2017 | Premiered: Apr 11, 2017

Oracle Corporation UK Ltd

4 Steps to Reduce the Risk of Malicious Insider Activity
sponsored by Veriato, Inc.
WHITE PAPER: Learn 4 key steps in implementing a risk-based monitoring program, culminating in an ability to appropriately monitor user activity at every level, all while ensuring security and privacy are maintained.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Improving Efficiency and Effectiveness with a Security Incident Response Platform
sponsored by IBM
WHITE PAPER: Discover how the combination of a SIEM with an incident response platform will help your organization overcome cybersecurity and compliance issues and take a big step closer to being "cyber resilient".
Posted: 13 Apr 2017 | Published: 30 Nov 2016

IBM

Mitigate Insider Threats: User Activity & Behavior Monitoring Program
sponsored by Veriato, Inc.
WHITE PAPER: Learn how to best implement a user activity monitoring and/or user behavior analytics program to increase security against insider threats, drive productivity increases, and produce more efficient and effective employee investigations.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Cybersecurity: The Rise of the Incident Response Platforms
sponsored by IBM
WHITE PAPER: In this ESG report learn how incident response platforms (IRPs) can solve many of the headaches plaguing IT and CISOs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

IBM

Why Your Organization Needs to be Cyber Resilent
sponsored by IBM
WHITE PAPER: 51% of companies believe that cyber resiliency is essential to achieving a strong security posture. Learn what it takes to be a cyber resilient organization, what barriers might be in your way, what threats you'll face, and more in this 2016 Ponemon study.
Posted: 12 Apr 2017 | Published: 30 Nov 2016

IBM

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

Rapid Growth of SSL Encryption
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

5 Steps to Improve Your Cyber Security Incident Response Plan
sponsored by IBM
WHITE PAPER: Having an incident response plan can positively impact the cost of a data breach. Access this white paper to learn five steps to assess and improve your existing incident response plan – or write a brand new one.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

IBM

3 Steps to Protect Your Data During the High Risk Exit Period
sponsored by Veriato, Inc.
WHITE PAPER: Discover 3 steps that can be put in place to mitigate the risk that employees place on your enterprise when they leave and take sensitive data with them.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Veriato, Inc.

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Q&A: Analyzing DNS Services with Paul Vixie
sponsored by Farsight Security
EGUIDE: Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.
Posted: 10 Apr 2017 | Published: 04 Apr 2017

Farsight Security

End-to-End Visibility: The Foundation of Business-Driven Security
sponsored by RSA
WHITE PAPER: Access this white paper now to learn how to gain visibility into your network and: how logs are not enough when it comes to visibility, a patchwork of point-solutions creates inefficient silos, modern infrastructure compounds blind spots, and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

RSA

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

How to Gain Peace of Mind in the Cloud: Email and Office 365
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.
Posted: 10 Apr 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise
26 - 50 of 143 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY TOKENS DEFINITION (continued): … A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification number (PIN), which authorizes them as the owner of that particular device; the device then displays a number which uniquely identifies the user to the service, allowing them to log in. The identification number for each user is changed frequently, usually every five minutes or so. Unlike a password, a security token is a physical object. A key fob, for example, is practical and easy to carry, and thus, easy for the user to protect. Even if the key fob falls into the wrong hands, however, it can't be used to gain access because the PIN (which only the rightful user knows) is also needed.
Security Tokens definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement