Remote Authentication Reports

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 26 Mar 2021 | Published: 01 May 2021

TechTarget

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global

The Digital Certificate: How It Works, Which to Buy
sponsored by TechTarget Security
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

TechTarget Security

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Information Security – May 2014
sponsored by TechTarget Security
EZINE: The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014

TechTarget Security

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence