Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed    Add to Google    Add to My Yahoo!
Tokens Reports
 
Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

E-Guide: Are 'strong authentication' methods strong enough for compliance?
sponsored by SearchSecurity.com
EGUIDE: Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
Posted: 27 Sep 2011 | Published: 26 Sep 2011

SearchSecurity.com

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Strong Authentication: Securing Identities and Enabling Business
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
Posted: 08 Jul 2008 | Published: 01 Jul 2008

Aladdin Knowledge Systems

RSA SecurID Authenticators
sponsored by RSA
PRODUCT LITERATURE: Download this white paper and learn about a two-factor authentication solution that is easy to implement, cost-effective and helps secure internal and remote network access for your company.
Posted: 27 Nov 2006 | Published: 27 Nov 2006

RSA

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
sponsored by StrikeForce Technologies
PRESENTATION TRANSCRIPT: Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

StrikeForce Technologies

A Comprehensive Introduction to RSA SecurID User Authentication
sponsored by RSA
PRODUCT LITERATURE: This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
Posted: 27 Nov 2006 | Published: 01 Nov 2006

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement