IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed   
2 Factor Authentication Reports
 
Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
RESOURCE: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Key Considerations for Deploying IAM and CIAM Software
sponsored by Optiv
EGUIDE: When properly implemented and in compliance with local security policies, identity access management software can serve as the center of any IT security strategy -- but it's important for IT pros to select the right platform for their organization. In this e-guide, explore key considerations for choosing both an IAM and a customer IAM software.
Posted: 10 Jun 2019 | Published: 05 Jun 2019

Optiv

Leading the Way With Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

Introducing the Next-Generation Authentication Platform
sponsored by Silverfort
PRODUCT OVERVIEW: In this solution brief, learn about Silverfort's agentless and holistic authentication platform. It monitors user access across all systems and environments and enforces adaptive AI-driven MFA, enabling organizations to mitigate threats in real-time and maintain compliance.
Posted: 22 May 2019 | Published: 22 May 2019

Silverfort

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

5 Must Haves for your Access Solution
sponsored by Akamai Technologies
RESOURCE: Download this infographic for five demands you should make of an updated, comprehensive application access solution.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Akamai Technologies

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement