authentication

Results 26 - 50 of 347Sort Results By: Published Date | Title | Company Name

Arten von SSL Zertifikaten

Published By: Thawte     Published Date: Oct 06, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices

Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic

Automating User Authentication: Simplifying Network Troubleshooting & Security Forensics

Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10, a10 networks
    
A10 Networks

Banks Seek to Stop Fraud in its Tracks with Simpler Stronger Authentication Brief-For Distribution

Published By: Intel Corp.     Published Date: Nov 21, 2017
This white paper provides an overview how banks seek to stop fraud in its tracks with simpler, stronger authentication.
Tags : 
    
Intel Corp.

Because Passwords Simply Aren't Enough

Published By: PassGo     Published Date: Aug 21, 2009
Historically, before computers and the Internet, business transactions were conducted face to face; establishing your partner's identity in such situations presented few problems. As human beings, we are well equipped to discern the extraorginarily subtle variations of the human face and voice to enable positive recognition and identification of our partner.
Tags : 
token, tokens, authentication, password management, pki, identity management, identification, business transaction, online business transaction, passgo, pass go, security, security management
    
PassGo

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Security Options

Published By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security, infrastructure
    
Symantec

Best Practices and Applications of TLS/SSL

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
    
VeriSign, Inc.

Best Practices and Applications of TLS/SSL

Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, application security, authentication, ddos, disaster recovery, hacker detection
    
Symantec

Best Practices and Applications of TLS/SSL

Published By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security, business technology
    
Symantec

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing

Best practices for establishing trusted authentication

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18

Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM

Best Practices for Multi-factor Authentication

Published By: Centrify     Published Date: May 26, 2016
Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper examines best practices for deploying MFA
Tags : 
authentication, multi-factor authentication, threat protection, cyber attacks, hacker detection, identity management, security management
    
Centrify

Best Practices for Step-up Multi-factor Authentication

Published By: Ping Identity     Published Date: Feb 12, 2016
Combine Risk-based Step-up MFA with Passive Contextual Authentication to Get the Best Combination of Cost Effectiveness, Usability and Security.
Tags : 
    
Ping Identity

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects, local area networking, network security, 802.11, wireless security
    
Nevis Networks

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication, software development
    
Entrust Datacard

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication, it management
    
Entrust Datacard

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard

Board Portal Buyer's Guide: Five Essential Qualities

Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
Diligent

Boosting Online Banking Confidence and Usage with Secure USB Authentication

Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin

Bringing Trust to the Cloud: Strong Authentication for SaaS Applications

Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, security management, application integration, application performance management, vulnerability management
    
VASCO

Build or Buy? 20 Identity Management Questions

Published By: Auth0     Published Date: May 12, 2016
Let’s be honest: If you’re just using one or two social providers for a simple web application, without needing a username/password database yourself, or any other more elaborate features, it is easy enough to DIY. By all means, leverage the basic authentication libraries you can find in any open source framework, and be done with it.
Tags : 
auth0, identity management, web application, framework, developer, business technology
    
Auth0
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.