authentication

Results 1 - 25 of 367Sort Results By: Published Date | Title | Company Name

See what Forrester Research is saying about enterprise email security

Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Verifying Digital Identities Beyond One Time Passwords

Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Sécurité ou simplicité de l'expérience de paiement : Que recherchent les acheteurs en ligne ?

Published By: GoCardless     Published Date: Oct 14, 2019
L'authentification forte du client (ou SCA pour Strong Customer Authentication) est une législation européenne qui entrera en vigueur le 14 septembre 2019. Pour de nombreuses entreprises, cette législation requirt la mise en place de mesures de sécurité supplémentaires au cours des achats en ligne. Les consommateurs accepteront-ils ces changements ou les rejetteront-ils en abandonnant la transaction en plein processus ? Les acheteurs recherchent-ils en priorité la sécurité ou la simplicité ? Nous avons mené une étude sur 4 000 clients en France, au Royaume Uni en Allemagne et en Espagne afin d'analyser leur attitude face à la sécurité et à la simplicité des achats en ligne. Téléchargez les résultats complets de l'étude et découvrez les réponses aux questions suivantes : Les acheteurs en ligne privilégient-ils la sécurité ou la simplicité ? Réduiraient-ils leurs achats auprès de marques disposant de processus de sécurité complexes ? Comment considèreraient-ils certains modes d'autorisat
Tags : 
    
GoCardless

Der vollständige Leitfaden zur Strong Customer Authentication (SCA)

Published By: GoCardless     Published Date: Oct 16, 2019
Die Strong Customer Authentication wird einen großen Einfluss auf Abonnement-Unternehmen haben, die Online-Zahlungen mit Karten einziehen. Wie wird die SCA Ihr Abo-Unternehmen beeinflussen? Eine Einführung in die Strong Customer Authentication Die Vorbereitung Ihres Unternehmens auf SCA Ausnahmeregelungen für SCA Ist GoCardless SCA-konform?
Tags : 
    
GoCardless

Multi-Factor Authentication MFA For Dummies eBook

Published By: Iovation     Published Date: Aug 02, 2019
We see a counterintuitive future whereby better security no longer means a more complicated or cumbersome user experience. We see a future in which users happily take control of their privacy, out-of-band mobile MFA is the norm, and nobody suffers the fallout from the last major credential breach. This future is free of sticky notes with scribbled codes and centralized credential stores. Indeed, it’s free of passwords altogether.
Tags : 
    
Iovation

Aite Group PSD2 Research Report: Advent of the New Payments Market in Europe

Published By: Iovation     Published Date: Aug 02, 2019
Aite Group’s second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : 
payment services directive, psd2 regulation
    
Iovation

Gain Market Advantage by Elegantly Solving for SCA Requirements Under PSD2

Published By: Iovation     Published Date: Aug 02, 2019
Learn about the second Payment Services Directive (PSD2), and its expected impacts on the payment services and e-commerce market. Find out what you need to prepare to handle the new strong customer authentication (SCA) requirements under the PSD2.
Tags : 
what is psd2, sca requirements, data privacy, privacy by design, pseudonymization
    
Iovation

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices

Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic

Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard

Accelerating Business Transaction with Effortless Authentication

Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard

Deploying Office 365 and Other Cloud Applications with a Cloud-based Authentication Solution

Published By: Entrust Datacard     Published Date: Mar 20, 2017
Microsoft® Office 365™ continues to lengthen its lead as the world’s top enterprise cloud service. Nearly one-in-four employees in Fortune 500 companies are active on Office 365 — and more than 90% of those large enterprises currently have more than 100 active users. Users are clearly becoming more reliant on Office 365, as usage grew at a rate of more than 300% in 2016.
Tags : 
    
Entrust Datacard

Managing the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations

Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco

Preempt launches access control platform that bridges identity, behavior and risk

Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt

Strong Customer Authentication Explained

Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe

The Impact of SCA: Shaking up Europe's Online Economy

Published By: Stripe     Published Date: Jun 11, 2019
Analyst firm 451 Research interviewed 500 businesses and 1,000 consumers and found that Europe's online economy risks losing €57 billion when Strong Customer Authentication (SCA) goes into effect on 14 September. SCA is intended to reduce fraud rates and enhance the overall security of online payments. But what does this mean for businesses and how can they best accommodate these new requirements in order to limit the financial impact? Download the report to find out.
Tags : 
sca, online economy, online payment
    
Stripe

Hadoop Security - Four Must-Haves

Published By: Dell EMC     Published Date: Oct 08, 2015
In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
    
Dell EMC

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies

Why Strong Authentication Is a Must for All Users

Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication, network security, access control, password management, security management, web service security, data protection, cloud computing, mobile device management
    
CA Technologies

3 Essential Components for a Strong End User Security Experience

Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell

Modernising Your SSL Certificate Management

Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates, erp, security verification, authentication, access control, application security, disaster recovery, encryption, identity management, password management, security management
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.