Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Authentication
Promotion accompanies secure access launch
Authentication : 24 October, 2016
Pulse Secure is offering discounts on Pulse Connect Secure for organisations looking to establish secure access to the cloud or data centre
 
Secure single sign on for MS Azure AD
Authentication : 23 September, 2016
Collaboration between Microsoft and Ping Identity provides identity and access management through single sign on for Azure virtual environments
 
Identity service support for latest Mac OS
Authentication : 23 September, 2016
Users of MacOS Sierra and iOS 10 gain support from the start for secure identity services from Centrify
 
Increased deployment options for privileged access manager
Authentication : 09 September, 2016
Centrify Privilege Service is now available in the cloud or on premises as well as through PIM as a service
 
Authentication and password management integration
Authentication : 02 September, 2016
ERPM from Lieberman Software now operates in conjuction with authentication platform from Okta
 
Identity verification for Norwegian postal company
Authentication : 02 September, 2016
Posten Norge of Norway is tackling fraud and money laundering with the introduction of ID verification software from Gemalto
 
Simplified security for French alcohol supplier
Authentication : 20 July, 2016
Employees at an alcohol company in France now have easier methods of securely accessing cloud apps with the use of Centrify identity management
 
Authenticated credential management
Authentication : 21 June, 2016
Partnershipt between Thycotic and Tenable simplifies credential management and authenticated assessments.
 
Privileged Access Management for Linux
Authentication : 17 June, 2016
Lieberman Software is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems
 
Developer programme for simplified access control
Authentication : 26 May, 2016
New developer programme from Centrify provides simplified single sign-on, multi-factor authentication and access control
 
Cloud based authentication protects Colombian financial transactions
Authentication : 24 May, 2016
Gemalto has supplied Colombia with the SafeNet cloud based authentication service to secure the financial transactions of its citizens through the national savings bank
 
Behavioural biometrics development for banking customers
Authentication : 12 April, 2016
Nationwide is introducing extensions to PIN and password security for its mobile app for customers banking on the move
 
IT professionals express dissatisfaction with passwords
Authentication : 29 March, 2016
A negative attitude to passwords as a robust method of identity management has been expressed by IT professionals in a new survey
 
Website security without passwords
Authentication : 04 March, 2016
Authentication service from iovation provides website administrators with a secure and user friendly alternative to password authentication
 
Mobile authentication services in Nigeria
Authentication : 12 February, 2016
Gemalto is providing an SaaS authentication service for mobile users for MTN Nigeria for digital identification
 
Cloud based endpoint privileged account security
Authentication : 04 February, 2016
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
 
Credential compromise a key IT security concern
Authentication : 15 January, 2016
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
 
The increasing problem of Shadow IT
Authentication : 29 December, 2015
SecurEnvoy explains Shadow IT and how the use of two-factor authentication within apps could provide organisations with the security they need
 
Strong authentication across Bluetooth
Authentication : 14 December, 2015
Bluetooth Smart technology used for bringing public key cryptographic based authentication to mobile devices
 
Technology integration brings high level access management to Dropbox
Authentication : 09 November, 2015
Dropbox file sync service has partnered with Centrify on the use of identity and access management technology for business users
 
Lack of access management limits user mobility
Authentication : 27 October, 2015
Survey from Gemalto reveals widespread restrictions on mobile devices due to a lack of authentication and identity access management capabilities
 
Remote management for cloud based deployments
Authentication : 27 October, 2015
Thales launches remote administration and management system for use with nShield and payShield hardware security modules
 
Secure access company celebrates first year of business
Authentication : 21 October, 2015
Pulse Secure has been operating for one year since its spin-off from the parent company and is now rapidly developing its products to meet the challenges of secure access
 
Credential access protection for smart meters
Authentication : 29 September, 2015
Smart metering systems from ADD are now given additional protection with Thales KeyAuthority for cryptographic key management
 
Privileged access management now supports latest Microsoft products
Authentication : 21 September, 2015
Microsoft Azure SQL and SQL Server 2016 are now supported by the latest version of Enterprise Random Password Manager
 
Additional security controls in user access management software
Authentication : 09 September, 2015
PowerBroker Password Safe uses workflow context to reduce risk from insider threats
 
Protecting against non-malware breaches
Authentication : 07 September, 2015
Dell SecureWorks provides advice on avoiding security breaches that make use of the company credentialling system without the use of malware
 
SMS based 2FA password reset service
Authentication : 19 August, 2015
Identity management service provider chooses SMS PASSCODE for performing password reset functions using two factor authentication to reduce help desk burden
 
Securing the IoT with the Help of Multi-Factor Authentication
Authentication : 30 July, 2015
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
 
Identity defined security the next priority
Authentication : 20 July, 2015
Clare Rees of Ping Identity examines social media trends in IT security and why identity defines security should be the next priority.
 
Multi-factor authentication for Orange cloud based applications
Authentication : 16 June, 2015
Orange Business Services will use the SafeNet multi-factor authentication service from Gemalto for customer corporate applications
 
Cloud authentication using NFC devices
Authentication : 06 May, 2015
ActivID Tap Authentication provides multi-factor credentialling for users of Microsot Office 365 and other cloud apps and services
 
Cloud based privileged identity management service
Authentication : 22 April, 2015
Managing priviliged identities in the cloud is now possible with the release of a new service for hybrid on-premises and cloud-based systems
 
NFC based authentication could see an end to passwords
Authentication : 14 April, 2015
SecurEnvoy is using the RSA Conference to demonstrate its prototype of single swipe authentication for Windows 10 using Near Field Communication
 
Tackling Today’s Authentication Complexities
Authentication : 07 April, 2015
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
 
Cloud based digital signing for clinical trials
Authentication : 12 March, 2015
SureClinical is using nShield hardware security modules from Thales for secure digital signing in clinical trials
 
Student loan agency employs multi factor authentication
Authentication : 12 March, 2015
A US student loan service provider is using IDPrime .NET from Gemalto for multi-factor authentication to replace passwords
 
Multi-factor authentication for wearable technology
Authentication : 04 March, 2015
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
 
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
 
Device based two factor authentication
Authentication : 12 February, 2015
Authentication service from iovation uses known laptops and smartphones as a means of verifying user authentication
 
Privileged account management growth in 2014
Authentication : 29 January, 2015
BeyondTrust reflects on a year of growth during 2014 in both privileged account and vulnerability management as customer demand increases
 
Can biometrics replace passwords
Authentication : 22 January, 2015
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor
 
SMS based 2FA overcomes password laziness
Authentication : 04 December, 2014
Silvio Kutic, CEO at Infobip examines the problem of a lazy approach to password security and explains how SMS based two-factor authentication could be the answer
 
Secure access to internal web applications
Authentication : 03 December, 2014
App Gateway from Centrify enables secure remote access to internal web applications without the need for a VPN
 
Access control for Citrix and Windows Terminal Server
Authentication : 02 December, 2014
Individual user level access control to sensitive data using Citrix and Windows Terminal Server now available with latest version of AppGate from Cryptzone
 
Mobile networks provide opportunity for secure authentication
Authentication : 20 November, 2014
SecurEnvoy white paper describes the secure authentication options available for mobile device users
 
Two-Factor Authentication promotion in Asia
Authentication : 18 November, 2014
SecurEnvoy is partnering with Infinite Data to bring advanced tokenless two-factor authentication technology into the vulnerable Asian region
 
Avoiding the pitfalls of authentication based IT security
Authentication : 10 November, 2014
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
 
SIEM and privileged threat analytics integration
Authentication : 07 November, 2014
CyberArk has integrated its Privileged Threat Analytics with the Enterprise Security Manager SIEM product from McAfee
 
User identification service management for cloud subscribers
Authentication : 24 October, 2014
Authentication software from Centrify is at the heart of a new Identit-as-a-Service product from AVG for use by managed service providers
 
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo