IT Management  >   Systems Operations  >   Security  >   AAA  >  

Two-factor Authentication

RSS Feed   
DEFINITION: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account. Fingerprint payment, based on fingerscanning, is the most common biometric payment method. Often, the system uses two-factor authentication, in which the finger scan takes the place of the card swipe and the user types in a PIN (personal  … 

Two-factor Authentication definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Two-factor Authentication Reports
 
Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Can Zero Trust Fix What’s Wrong with IT Security?
sponsored by PortSys
RESOURCE: Why is zero trust such a prominent discussion both in the board room and among IT security professionals? Read this article for a look at how zero trust access changes the IT security game today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

PortSys

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
VIDEO: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: 16 May 2019

RSA Conference

The Perimeter at the Data Object: Zero Trust and Data Protection
sponsored by Virtru
WHITE PAPER: Discover how to use a data-centric approach to embrace the core tenets of Zero Trust, how the Trusted Data Format (TDF) fulfills the least privileged access approach of a Zero-Trust strategy, and how to get started with Zero Trust today.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Virtru

Delivering Frictionless Security to the Clinical Workflow
sponsored by Imprivata
ANALYST REPORT: Frictionless security is becoming increasingly important in healthcare: security that is well-integrated into clinical workflows and provides the necessary access controls. In this white paper, learn how to simplify the task of achieving frictionless security by using a single provider for access management across the entire clinical workflow.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Imprivata

Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce
sponsored by Ignition Technology Ltd
ANALYST REPORT: To ease the transition from a traditional perimeter and to embrace an evolving workforce, organizations are deploying the building blocks of a zero-trust security framework. In this 2019 Duo Trust Access Report, explore key findings about zero trust and how Duo's customers are adopting different principles.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Ignition Technology Ltd

Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement