IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed   
User Authentication Reports
 
How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

The Essentials: Privileged Access Management
sponsored by HelpSystems
WHITE PAPER: Find out how you can effectively control and protect privileged UNIX and Linux accounts using centralized access management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

Biometrics: Learn the advantages and disadvantages
sponsored by Onfido
EGUIDE: When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement