IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed   
Network Authentication Reports
 
Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

How to Secure Your Post-Perimeter World
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices to access corporate resources, it sets up the need for a new security architecture: post-perimeter security. In this white paper, learn why the world is moving to post-perimeter security, what you need, and how to make it happen.
Posted: 06 May 2019 | Published: 06 May 2019

Lookout

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

ACT.md Sees 2x Dev Savings With Auth0
sponsored by Auth0
RESOURCE: To serve patients well, providers need fast and secure access for a wide variety of health and government institutions, each with different ways of verifying identity. In this case study, learn how ACT.md was able do so using Auth0.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Auth0

Evaluating Identity Verification Solutions
sponsored by Onfido
RESOURCE: When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Onfido

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Introducing the Next-Generation Authentication Platform
sponsored by Silverfort
PRODUCT OVERVIEW: In this solution brief, learn about Silverfort's agentless and holistic authentication platform. It monitors user access across all systems and environments and enforces adaptive AI-driven MFA, enabling organizations to mitigate threats in real-time and maintain compliance.
Posted: 22 May 2019 | Published: 22 May 2019

Silverfort

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement