IT Management  >   Systems Operations  >   Security  >   AAA  >  

Two-factor Authentication

RSS Feed   
DEFINITION: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account. Fingerprint payment, based on fingerscanning, is the most common biometric payment method. Often, the system uses two-factor authentication, in which the finger scan takes the place of the card swipe and the user types in a PIN (personal  … 

Two-factor Authentication definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Two-factor Authentication Reports
 
Pragmatic Zero Trust
sponsored by Capgemini
RESOURCE: There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’
Posted: 08 Sep 2020 | Published: 23 Jan 2020

Capgemini

Privileged Access Management to Prevent a Ransomware Attack
sponsored by Hitachi Vantara
RESOURCE: The victims of 2020’s 11 most devastating ransomware attacks have paid a massive sum of $144.2 million in their recovery efforts. In this article, discover how privileged access management (PAM) can be implemented to proactively reduce the threat of ransomware.
Posted: 17 Sep 2020 | Published: 10 Sep 2020

Hitachi Vantara

Outbound Email Security Essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

Single Sign-On Without the Complexity
sponsored by Citrix
EBOOK: An improperly managed SSO forces organizations to implement several access solutions from different vendors to cover their application landscape. In doing so, any productivity and user experience benefits are wiped out, zero trust becomes more difficult and costs go up. Take control of security – read this e-book on Citrix Workspace SSO.
Posted: 28 Sep 2020 | Published: 20 Aug 2020

Citrix

Zero Trust: Adopting, Building and Managing your Strategy
sponsored by TechTarget
RESOURCE: Today's security landscape is more hostile than ever before. Threats are evolving at an unprecedented rate, and it's up to security professionals to face the challenge. The Complete Zero Trust Handbook offers guidance into what is the most effective defense against modern threats. Complete our survey to secure your free copy.
Posted: 11 Aug 2020 | Published: 10 Sep 2020

TechTarget

SailPoint Predictive Identity
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.
Posted: 03 Aug 2020 | Published: 30 Apr 2020

SailPoint Technologies

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Cybersecurity Risk: A Board’s-Eye View Chapter 4
sponsored by PortSys
WHITE PAPER: Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.
Posted: 29 Sep 2020 | Published: 01 Aug 2020

PortSys

TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.
Posted: 18 Aug 2020 | Published: 20 Jun 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info