IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Identity Management (Security)

RSS Feed   
Identity Management (Security) Reports
 
Pockit Integrates Onfido to Meet Their KYC & AML Requirements
sponsored by Onfido
CASE STUDY: Pockit, a privately owned bank, was faced with the challenge of onboarding customers and verifying their identity. Download this case study to learn how Onfido helped them meet their AML and KYC requirements along with quickly onboarding new customers.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Onfido

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

TOPICS: 
SAS

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

Couchsurfing Verifies the Identity of Users and Builds Trust Throughout Community
sponsored by Onfido
CASE STUDY: Since an address, credit card, or phone number doesn't verify a user's identity directly, Couchsurfing a social networking site for travelers, wanted a verification system that would improve trust between its users. Read on to find out how Onfido made this happen.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Onfido

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

TOPICS: 
ComputerWeekly.com

3 Types of SSL Certificates
sponsored by HID Global
RESOURCE: Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.
Posted: 20 Oct 2017 | Published: 13 Jul 2017

TOPICS: 
HID Global

Creating Trust as Mobile Banking Fraud Escalates
sponsored by HID Global
EBRIEF: Take a closer look at this white paper to uncover security risks mobile bankers are facing and what banks can do to create trust in mobile transactions
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TOPICS: 
HID Global

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

TOPICS: 
WhiteHat Security

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE: Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018

TOPICS: 
Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement