Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
To qualify for this special offer, organizations must either currently use Entrust IdentityGuard 9.3 or higher, or purchase the recently launched Entrust IdentityGuard 10.0. A hard token from any ...
Entrust, Inc., a world leader in securing digital identities and information, announces the launch of an industry-leading hard token replacement program. Beginning today, organizations that currently ...
In an effort to draw companies to adopt its IdentityGuard security program, Entrust is offering a hard-token replacement program. Companies that wish to partake in the hard-token replacement program ...
As a leading mobile authentication service provider, Diversinet provides its customers with cost effective, mobile-optimized strong authentication products and services that reduce identity theft and ...
Le Brun asks: "Technology has moved on, so isn’t it about time to kill off the hardware token?" The cost of 2FA First, let’s cover the basics. Two-factor authentication (2FA) is where a user’s ...
Multi-factor authentication requires users to present two or more pieces of evidence to prove their identity, such as a password and a one-time code sent to an ...
What kind of value will a financial institution get for its investment in strong authentication? For FIs, it’s become a burning question, thanks to federal guidance that recommends they boost the ...
ROCHESTER, N.Y.--(BUSINESS WIRE)--Token, a revolutionary provider of secure, wearable authentication solutions, today announced that the company has begun production of its smart ring in the United ...
In 2017, we saw a new influx of spectacular and devastating breaches. Somewhat lost in the chaos was a surprising trend amongst them -- a sharp escalation in attackers utilizing stolen, valid ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results