IT Management  >   Systems Operations  >   Security  >   AAA  >  

Two-factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account. Fingerprint payment, based on fingerscanning, is the most common biometric payment method. Often, the system uses two-factor authentication, in which the finger scan takes the place of the card swipe and the user types in a PIN (personal  … 
Definition continues below.
Two-factor AuthenticationReports
 
Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

SMS Two-Factor Authentication Options
sponsored by StrikeIron
EGUIDE: In this e-guide, discover the new two-factor authentication options that involve SMS text messages.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

StrikeIron

A Security Survey of Strong Authentication Technologies
sponsored by SafeNet, Inc.
WHITE PAPER: This resource highlights the most commonly used authentication methods, and details the strengths and weaknesses of each to help you decide which solution is best for you.
Posted: 30 May 2014 | Published: 21 Mar 2014

SafeNet, Inc.

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.

Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd
 
 
TWO-FACTOR AUTHENTICATION DEFINITION (continued): …  ID number) as usual. Here's an example of how one fingerprint payment system works:The shopper registers for a biometric program at a store kiosk by presenting valid identification and bank account information. The shopper scans his index finger using the kiosk's fingerscan reader. The store's fingerscan reader encrypts multiple point-to-point measurements of the fingerprint and stores the customer's biometric data and banking information in a centralized database. The shopper now has the option of selecting biometric payment at the point of sale register. If he chooses biometric payment, … 
Two-factor Authentication definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement