factor authentication

Results 51 - 75 of 75Sort Results By: Published Date | Title | Company Name
By: Arcot     Published Date: Jun 04, 2008
Man-in-the-Middle attacks can defeat most kinds of multi-factor authentication, including OTP tokens. Financial institutions, brokerages, and other likely targets of MITM attacks should consider the ability of their countermeasures to defeat MITM attacks, as these types of attacks will continue.
Tags : authentication, identification, identity, identity theft, arcot, man in the middle, man-in-the-middle, mitm
     Arcot
By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
     Symantec
By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : security, multi-factor authentication, network security risks
     Akamai Technologies
By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Confident Technologies     Published Date: Jun 29, 2011
Two-factor, mobile authentication using images.
Tags : authentication, two-factor authentication, multifactor authentication, security, website security
     Confident Technologies
By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
     Symantec
By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
     Secure Computing
By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
     OneLogin
By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : security, enterprise, cloud
     MobileIron
By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
     Imprivata
By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security
     SafeNet
By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
     Symantec
By: Entrust Datacard     Published Date: Jul 21, 2014
As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.
Tags : authentication, healthcare, medicine, identity, security, cms system
     Entrust Datacard
By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot, security
     Arcot
By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
     IBM
By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
     Symantec
By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : vasco, cloud computing, technology, saas applications, authentication, security, business technology
     VASCO
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
     Duo Security - Nethawk
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
     Duo Security - Nethawk
By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : user authentication, mobile multi factor authentication, data flows, security, it strategies
     IBM
By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
     Confident Technologies
Start   Previous    1 2 3     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com