Hardware Tokens Reports

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT: Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
sponsored by Intel
PRESENTATION TRANSCRIPT: In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

How Security Can Help Grow Your Business: The Marketing Side of Tokenization
sponsored by First Data Corporation
WHITE PAPER: Tokenization is more than a security measure and more than a cost savings technique. It can be used to build your business. This white paper discusses the ways tokens can be used in back-end business operations to develop powerful marketing programs.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation