IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed   
2 Factor Authentication Reports
 
Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks
sponsored by Okta
VIDEO: Find out the latest trends in credential-based attacks and why every sensitive cloud application needs multi-factor authentication.
Posted: 17 Jul 2018 | Premiered: 31 Oct 2017

Okta

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta

Identity-Led Security and Strong Authentication
sponsored by Okta
VIDEO: Join this webinar to learn why identity isn't simply just a "first step" and what characteristics a strong authentication should include.
Posted: 17 Jul 2018 | Premiered: 16 Jul 2018

Okta

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: 81% of data breaches involve the misuse of privileged credentials, according to the Verizon DBIR. This white paper examines how privileged access management (PAM) can help reduce the risk associated with privileged accounts.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement