ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Tokens Research

  • April Essential Guide to Data Protection

    Sponsored by: TechTarget Security

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  • Security risks that can affect your industry

    Sponsored by: TechTarget Security

    As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.

  • E-Guide: Are 'strong authentication' methods strong enough for compliance?

    Sponsored by: TechTarget Security

    Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.

  • Securing Access to the Office 365 Cloud with Two Factor Authentication

    Sponsored by: Data3

    Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements

    Sponsored by: StrikeForce Technologies

    Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.

  • Implementing Tokenization Is Simpler Than You Think

    Sponsored by: First Data Corporation

    A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.

  • Tokenization Buyer's Guide

    Sponsored by: Intel

    PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.

  • Reducing PCI DSS Scope with the First Data® TransArmor® Solution

    Sponsored by: First Data Corporation

    Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.

  • How Security Can Help Grow Your Business: The Marketing Side of Tokenization

    Sponsored by: First Data Corporation

    Tokenization is more than a security measure and more than a cost savings technique. It can be used to build your business. This white paper discusses the ways tokens can be used in back-end business operations to develop powerful marketing programs.

  • Presentation Transcript: ISACA PCI Compliance Symposium

    Sponsored by: Intel

    Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.

  • Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance

    Sponsored by: Intel

    In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.

  • Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization

    Sponsored by: Intel

    Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • Reducing PCI DSS Scope: The Gateway Approach

    Sponsored by: Intel

    This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.

  • Readers' Choice Awards

    Sponsored by: Information Security Magazine

    Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.

  • Authentication Tokens: The Key to Secure PCs and Data

    Sponsored by: Aladdin Knowledge Systems

    This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.