authentication

Results 201 - 225 of 367Sort Results By: Published Date | Title | Company Name

CIO eGuide: Preventing Data Breaches

Published By: Okta     Published Date: May 12, 2017
This guide will explain how Okta Adaptive Multifactor Authentication (MFA) provides the security that IT needs, while also providing the simplicity end users want.
Tags : 
    
Okta

Multi-factor Authentication: Moving Beyond User Name & Password

Published By: Okta     Published Date: May 12, 2017
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's multi-factor authentication solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : 
    
Okta

Building the Next Generation Network: Identity as the Perimeter with Nexteer Automotive Corporation

Published By: Okta     Published Date: May 15, 2017
Watch this video to learn how strong-yet-flexible multi-factor authentication allows companies to embrace cloud-based IT delivery where identity and authentication form the new security perimeter.
Tags : 
    
Okta

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks

Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA

Next Generation Criminal Fraud Detection

Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
IBM

The Pitfalls of Two-Factor Authentication

Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft, anti spyware, hacker detection, identity management, internet security, security management, single sign on, web service security, vulnerability management, data loss prevention
    
IBM

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Feb 06, 2015
Download the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISA’s Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.
Tags : 
nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management, knowledge management, data management, mobile data systems
    
IBM MaaS360

Quick, Which Is It ? Approve, Review or Block? Determining payment decisions

Published By: SAS     Published Date: Mar 06, 2018
Industry leaders from the banking and vendor landscape are working to streamline the customer experience while closing the opportunities for fraud and exposure. Balancing security and convenience will require an approach that combines consumer-facing authentication (such as passwords, PINs and biometrics) with background security measures (such as transaction and session-behavior analytics).
Tags : 
    
SAS

A Prescription for Privacy: Security Requirements for Electronic Health Records

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : 
verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication, symantec, access control, security management, security policies, ssl
    
VeriSign, Inc.

Choosing a Cloud Hosting Provider with Confidence

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : 
verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access, authentication, encryption, disaster recovery, ssl
    
VeriSign, Inc.

Best Practices and Applications of TLS/SSL

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
    
VeriSign, Inc.

Security and Trust: The Backbone of Doing Business Over the Internet

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication, encryption, sgc, http, anti spam, anti spyware, anti virus, hacker detection, internet security, phishing, ssl, customer relationship management, customer satisfaction
    
VeriSign, Inc.

ForgeRock Identity Platform Customer-driven, Internet-scale Identity Relationship Management

Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication, it management
    
ForgeRock

ITCi White Paper: Challenges and Opportunities of PCI

Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire, pci compliance
    
Tripwire

PCI DSS Compliance with Tripwire

Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire

The PCI Data Security Standard

Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire

Next Generation Criminal Fraud Detection

Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware, security, it management, knowledge management, enterprise applications
    
IBM

Improve Your Mobile Application Security with IBM MobileFirst Platform

Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones
    
IBM

Infuse identity across all applications and endpoints

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.
Tags : 
    
Group M_IBM Q418

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

Ovum Decision Matrix: Selecting and Identity-as-a Service (IDaaS)

Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM

Best practices for establishing trusted authentication

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18

Compliance-proof your identity and access management program

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
For financial institutions, IBM access management solutions can ease regulatory compliance and provide user-centric authentication options.
Tags : 
compliance-proof, access management, user-centric authentication, regulatory compliance
    
Group M_IBM Q1'18

IBM Security: Future of Identity Report

Published By: Group M_IBM Q1'18     Published Date: Feb 08, 2018
Research commissioned by IBM reveals consumer preferences for identity authentication, including biometrics and multifactor authentication.
Tags : 
security, identity authentication, multifactor authentication
    
Group M_IBM Q1'18

Extended Validation SSL Certificates

Published By: thawte     Published Date: Aug 27, 2008
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, secure socket, authentication, identity management, identification
    
thawte
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.