Fingerprinting White Papers
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Top Five DNS Security Attack Risks and How to Avoid Them
Sponsored by: InfobloxRead this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
-
Top 5 DNS Security Attack Risks and How to Avoid Them
Sponsored by: InfobloxThis paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
-
Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
Sponsored by: CiscoDiscover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
-
Credit Issuers: Stop Application Fraud At The Source With Device Reputation
Sponsored by: iovation, Inc.Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
-
Online Dating: Keeping Your Members Safe from Online Scams and Predators
Sponsored by: iovation, Inc.This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
-
Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
Sponsored by: iovation, Inc.Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.