IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Smartcards

RSS Feed    Add to Google    Add to My Yahoo!
Smartcards Reports
 
Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

The 2014 Wi-Fi Challenge: Understanding and Managing Wi-Fi in Today's Mobile World
sponsored by Extreme Networks
WHITE PAPER: This exclusive paper contains key issues to consider when trying to conquer the mobile revolution, lead by Robin Layland, principal analyst of Layland Consulting. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Extreme Networks

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER: This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent

RSA SecurID Authenticators
sponsored by RSA
PRODUCT LITERATURE: Download this white paper and learn about a two-factor authentication solution that is easy to implement, cost-effective and helps secure internal and remote network access for your company.
Posted: 27 Nov 2006 | Published: 27 Nov 2006

RSA

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement