Skip to content
 

strong authentication

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot
    
Arcot
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
    
Confident Technologies
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : 
entrust, homeland security, frac, identification standards, first responder
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance
Tags : 
entrust, healthcare, cms systems, medicare, medicaid
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : 
identity, authentication, first responders, u.s. homeland security, frac
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.
Tags : 
authentication, healthcare, medicine, identity, security, cms system
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Learn why mobile is the future of enterprise authentication. Discover how mobile: • Elicits stronger, more convenient authentication • Promotes quicker and better user adoption • Future-proofs your organization
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: FICO     Published Date: Sep 12, 2017
PSD2 aims to tackle payments fraud and Strong Customer Authentication is the weapon of choice. Unfortunately, Strong Customer Authentication has a downside, it increases the burden on customers who must prove they are the legitimate account holder more often.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Published By: Intel Corp.     Published Date: Nov 21, 2017
This white paper provides an overview how banks seek to stop fraud in its tracks with simpler, stronger authentication.
Tags : 
    
Intel Corp.
Previous   1 2    Next    
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.