AT&T* has announced the addition of soft token authentication support to AT&T Token Authentication Service, which helps mobile workers more easily protect commercial and government resources using ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
“Entrust's security framework not only bridges physical, logical and mobile access management via a single platform, but also provides necessary migration capabilities to co-exist with current systems ...
New soft tokens from Diversinet can be used on “mobile devices supporting Java, Symbian, Windows Mobile, Palm and RIM operating systems, on SanDisk TrustedFlash(TM) memory cards, and on personal ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID(R) Software Token for iPhone Devices that enables an iPhone to be ...
To qualify for this special offer, organizations must either currently use Entrust IdentityGuard 9.3 or higher, or purchase the recently launched Entrust IdentityGuard 10.0. A hard token from any ...
Security breaches are on the up – we all know that – and they are set to get worse. In order to interact with suppliers online, organizations will be expected to have stronger authentication, which is ...
Le Brun asks: "Technology has moved on, so isn’t it about time to kill off the hardware token?" The cost of 2FA First, let’s cover the basics. Two-factor authentication (2FA) is where a user’s ...
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...
A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results