Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed    Add to Google    Add to My Yahoo!
Tokens Reports
 
Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013

HID

Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
sponsored by Intel
PRESENTATION TRANSCRIPT: In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

ePass2000 Network Token: Securing E-Business Applications
sponsored by Feitian Technologies
PRODUCT OVERVIEW: ePass2000 was designed to offer authentication, verification and information encryption services, and support E-mail Encryption.
Posted: 09 Jan 2006 | Published: 01 Jan 2002


Securing Access to the Office 365 Cloud with Two Factor Authentication
sponsored by Data#3
WHITE PAPER: Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
Posted: 29 Oct 2013 | Published: 01 Feb 2012

Data#3

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

A Comprehensive Introduction to RSA SecurID User Authentication
sponsored by RSA
PRODUCT LITERATURE: This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
Posted: 27 Nov 2006 | Published: 01 Nov 2006

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement