MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 14, 2006
Erin Joyce
IT to Endpoints: Who Are You? Security vendors say enterprises need to be a lot more picky about their network access protocols. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
InternetNews
September 21, 2004
Ryan Naraine
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. mark for My Articles similar articles
InternetNews
March 2, 2005
Sean Michael Kerner
ETrade Adopts RSA Authentication ETrade customers now have the option of protecting their accounts with two-factor security from RSA. mark for My Articles similar articles
InternetNews
February 6, 2007
Michael Hickins
Microsoft's New Security Features Microsoft updated customers on the status of Longhorn server and new security products and enhancements at RSA. mark for My Articles similar articles
InternetNews
March 18, 2011
RSA Hit By Security Breach for SecurID Security vendor RSA admits a breach, should you be worried? mark for My Articles similar articles
InternetNews
October 24, 2006
Clint Boulton
Microsoft Fortifies Smart Card Software Microsoft today took its Certificate Lifecycle Manager to beta 2, improving the software's ability to manage Windows-based smart cards and digital certificates. mark for My Articles similar articles
InternetNews
December 5, 2005
Jim Wagner
RSA Buys For The Bank, Restructures Identity and access management experts RSA Security got a little more secure with the $145 million purchase of anti-fraud and anti-phishing software vendor Cyota. mark for My Articles similar articles
InternetNews
February 24, 2004
Jim Wagner
Sun: Security is a Lifestyle Choice The Java Desktop System is first to get Sun's new super-security and authentication treatment, which puts the OS up against Microsoft's Windows platform. mark for My Articles similar articles
JavaWorld
August 2001
Todd Sundsted
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... mark for My Articles similar articles
Bank Systems & Technology
January 1, 2007
Maria Bruno-Britz
The Missing Link in the Financial Supply Chain As banks enter the financial supply chain management space, they must keep the security of transactions in mind. This goes beyond simple encryption to the actual authentication of the parties involved in a transaction. mark for My Articles similar articles
InternetNews
April 3, 2008
Andy Patrizio
Sun, Accenture Sign On to Security Venture Sun Microsystems and Accenture team to provide fine-grain security to SAP and other enterprise applications to outsiders. mark for My Articles similar articles
InternetNews
March 3, 2006
Erin Joyce
Neal Creighton, CEO, GeoTrust Digital certificate authority Neal Creighton sees a busy year dawning. The co-founder of GeoTrust explains why. mark for My Articles similar articles
InternetNews
July 5, 2006
Ed Sutherland
Broadcom's Secure RFID Chips Take Flight Chipmaker chipmaker Broadcom has announced what it called the first secure processor with embedded RFID capabilities. It's also the latest company to join RSA Security's SecurID Ready for Authenticators program. mark for My Articles similar articles
InternetNews
June 20, 2005
Clint Boulton
Single Sign-On, The Java Way Sun's latest ID management products are designed to allow rights provisioning for partner users. mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
InternetNews
August 18, 2005
Tim Gray
Consumers' Online Security Concerns Rising A new study suggests that authentication technologies may help regain online users' trust. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
InternetNews
May 23, 2006
Andy Patrizio
WinFX Adds New Security Method Beta 2 of WinFX is available with full support for InfoCard, a technology that could radically change security on the internet. mark for My Articles similar articles
InternetNews
October 24, 2005
Tim Gray
Companies Bid for Authentication Compliance Work Financial institutions are getting started on security compliance regulations. mark for My Articles similar articles
Bank Systems & Technology
February 27, 2006
Larry Greenemeier
Banks Benefit as Authentication Providers Duke It Out As emerging security threats cause confidence in online services to wane, financial services firms are searching for ways to restore users' faith. Rival providers of online authentication technology are leveraging the opportunity to spread their technology across the globe. mark for My Articles similar articles
InternetNews
July 22, 2009
Alex Goldman
A Better iPhone for the Enterprise? RSA says the release of its SecurID Token helps address iPhone security concerns. mark for My Articles similar articles
InternetNews
April 7, 2008
Sean Michael Kerner
The Annual Pitch For Two-Factor Security VeriSign keeps the faith on pitching two-factor authentication with new features, partners this year. mark for My Articles similar articles
Bank Technology News
April 2011
Rebecca Sausner
RSA's Breach is Bad News All Around For banks and their customers, the ramifications of RSA's security breach are far-reaching. mark for My Articles similar articles
Bank Systems & Technology
July 22, 2008
Orla O'Sullivan
RSA Offers New Security Tokens for Online Banking RSA says one U.S. bank and several abroad are testing the Bedford, Mass.-based vendor's first security token modeled on a credit card. mark for My Articles similar articles
InternetNews
May 24, 2005
Erin Joyce
Microsoft Moving From Passport to InfoCard Microsoft releases its latest Web services platform, offering an olive branch on interoperable identity management to partners. mark for My Articles similar articles
InternetNews
February 17, 2009
Paul Shread
Sun's Encryption Keys Going Open Source Just days after seven IT vendors proposed an encryption key management standard, Sun is open sourcing its own key management technology. mark for My Articles similar articles
InternetNews
November 8, 2005
Clint Boulton
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. mark for My Articles similar articles
The Motley Fool
February 2, 2006
Mike Cianciolo
RSA Security Locks Up Business The computer security firm follows its earnings report with its biggest deal yet. While its stock certainly isn't cheap, RSA does seem to be reasonably valued. mark for My Articles similar articles
InternetNews
December 1, 2008
Richard Adhikari
PayPal Rings Up Two-Factor Security PayPal customers can now use their cell phones to authenticate their transactions through a new service that lets customers use SMS messaging to get a randomly-generated access code to log into their accounts. mark for My Articles similar articles
PC Magazine
November 30, 2004
Sharon Terdeman
AOL Beefs up Security AOL is offering its customers a new premium service -- a two-factor authentication system called PassCode. mark for My Articles similar articles
JavaWorld
February 2002
Todd E. Sundsted
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? mark for My Articles similar articles
InternetNews
February 14, 2005
Michael Singer
VeriSign Revamps Security Lineup The security vendor makes renewed pitch for two-factor authentication to protect against security threats. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
U.S. Banker
May 2011
Rob Garver
Another Stab at Federated Identity The administration is exploring an identity ecosystem that envisions universal Internet log-in credentials for consumers. Will the prospect of more secure e-commerce win banks over to the idea? mark for My Articles similar articles
InternetNews
February 13, 2006
Sean Michael Kerner
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Cory Levine
VASCO Bolsters Tokens The strong authentication vendor has bolstered its hardware authentication offerings with the release of two new user authentication products for online commerce. mark for My Articles similar articles
InternetNews
February 7, 2007
Clint Boulton
RSA Grows Its Data Protection Mix RSA, EMC's security division, moved to expand its strategy for securing encryption endpoints in corporate networks by agreeing to purchase Valyd Software Private Ltd. for an undisclosed sum. mark for My Articles similar articles
InternetNews
February 15, 2005
Erin Joyce
Gates Touts New IE With Better Security Bill Gates takes wraps off IE news and free anti-virus software during his talk at the annual RSA Security Conference. mark for My Articles similar articles
InternetNews
June 29, 2006
Paul Shread
EMC Acquires RSA EMC announced late Thursday that it will acquire RSA Security for about $2.1 billion. mark for My Articles similar articles
InternetNews
June 5, 2006
Clint Boulton
Ping For Safer Log-ins Ping Identity, a standalone maker of secure single sign-on software for managing Web-based exchanges, improved its software platform for allowing businesses to securely complete transactions and share information. mark for My Articles similar articles
InternetNews
May 22, 2006
Erin Joyce
Mike Nash, Microsoft's Security Technology unit The soon-to-be outgoing Microsoft security honcho chats up the big Vista security picture. mark for My Articles similar articles
JavaWorld
December 2002
Michael Juntao Yuan
Data security in mobile Java applications Learn how to select and use third-party security toolkits mark for My Articles similar articles
InternetNews
April 22, 2009
Janet Rae-Dupree
Microsoft: Internet, PCs Need New Security Model At RSA, Scott Charney pitches the Microsoft's "Geneva" project - and talks up hardware-based identity. mark for My Articles similar articles
InternetNews
September 28, 2005
SanDisk Makes Media More Mobile SanDisk has begun selling TrustedFlash cards containing rights management to safely transport movies, music and games to mobile phones, music players, etc. mark for My Articles similar articles
The Motley Fool
April 6, 2005
W.D. Crotty
No Safety in RSA Security Numbers The computer security firm won't meet the revenue and earnings guidance it gave in January. Until the company re-establishes sales and earnings growth, the stock's price, at 24 times trailing earnings, looks fairly valued mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
InternetNews
February 26, 2009
David Needle
Firm Sees iPhone as Enterprise Security Token Forget smart cards: Charismathics says its iEnigma gives companies a way to enable two-factor authentication on their iPhone. mark for My Articles similar articles
InternetNews
April 20, 2009
Alex Goldman
RSA's Free Offer to Developers Links to the Cloud RSA is offering for free what it calls "the most widely deployed software in the world." mark for My Articles similar articles