Smart Media Cards Reports

Best Practices for mobile authentication
sponsored by TechTarget Security
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

TechTarget Security

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
sponsored by ADT
EGUIDE: This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

ADT

Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER: This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

CW EMEA - April 2023: Under attack and stressed out
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.
Posted: 12 Apr 2023 | Published: 13 Apr 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com