IT Management  >   Systems Operations  >   Security  >   AAA  >  

Two-factor Authentication

RSS Feed   
DEFINITION: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account. Fingerprint payment, based on fingerscanning, is the most common biometric payment method. Often, the system uses two-factor authentication, in which the finger scan takes the place of the card swipe and the user types in a PIN (personal  … 

Two-factor Authentication definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Two-factor Authentication Reports
 
The 10 Universal Truths of Identity and Access Management
sponsored by One Identity
WHITE PAPER: IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

The Importance of the Facilitated Password Process for Enterprise Password Management
sponsored by Fast Pass Corp
WHITE PAPER: According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Overcome the Top 5 Cloud Migration Obstacles with IAM
sponsored by Identity Automation
EBOOK: According to an IDG survey, 45% of organizations have already moved their applications and computing infrastructure to the cloud. Explore this resource to gain insight into why IAM should be the focal point of your cloud migration strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

Future of Device Fingerprinting
sponsored by Simility
WHITE PAPER: A crucial part of fraud detection in the virtual world has been assigning an identity to every laptop, tablet and mobile device that accesses websites or apps. Explore this white paper to gain insight into an advanced device fingerprinting strategy and how it can boost your current authentication approach.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Simility

GDPR Infographic
sponsored by Fast Pass Corp
RESOURCE: According to the Verizon Data Breach Investigations Report, 63% of confirmed data breaches involved weak, default, or stolen passwords. Take a closer look at this IDC infographic to uncover strategies for improving your IAM approach to become GDPR compliant.
Posted: 29 Dec 2017 | Published: 29 Dec 2017

Fast Pass Corp

4 Challenges Building Digital Payments is Creating and How to Address Them
sponsored by Applause
WHITE PAPER: This white paper explores how to build and test payment apps that are reliable and deliver a quality user experience. Learn about crowdtesting and how it can help you overcome 4 key challenges associated with building digital payment apps across web and mobile.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Applause

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement