Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Identity and Authentication Services

Results for Identity and Authentication Services

The ultimate security boundary Unified Identity by Symantec At Symantec we thrive protecting people's ...
Blog Entry by Roger_Casals | 12 Dec 2014 | 0 comments
Let Home Depot be your example We talk a great deal about using strong authentication to secure access for enterprise employees, but often we don’t think about how breaches to vendors ...
Blog Entry by Teresa Law | 07 Nov 2014 | 0 comments
You need to stay competitive and allowing users to work anywhere, anytime is one of the ways your business keeps its edge.  However, in some cases this means using personal devices to access data in unsanctioned cloud applications.  In IT’s opinion this ...
Blog Entry by Teresa Law | 03 Nov 2014 | 0 comments
Bash provides an opportunity for attackers to steal passwords for use now or in the future - you need a second layer of security. Every vulnerability it seems could result in the theft ...
Blog Entry by Teresa Law | 27 Sep 2014 | 0 comments
If anyone needed another reason to be wary of using solely passwords to protect their accounts, the recent report of the Russian cybercrime team that stole 1.2 billion usernames and passwords from 420,000 websites is that reason.  It makes you wonder, ...
Blog Entry by Teresa Law | 18 Aug 2014 | 0 comments
Managed PKI Service 8.11 featuring a self-service portal, administrator enhancements, and updated platform support has been made generally available to customers. Feature Details Self-Service Portal Managed PKI 8.11 provides a Self ...
Blog Entry by Teresa Law | 27 Jun 2014 | 0 comments
NEW VIP Access Push for VPNs makes authentication easy! VIP Enterprise Gateway 9.5 supporting authentication using VIP Access Push has been made generally available to customers. ...
Blog Entry by Teresa Law | 27 Jun 2014 | 2 comments
VIP Access for Android 2.2 - part of the new wave The release of VIP Access for Android on June 16th is a landmark event, as it is makes use of market leading technology to create a ...
Blog Entry by Teresa Law | 17 Jun 2014 | 0 comments
We all know passwords are insecure and two-factor authentication should be the rule not the exception. But what's the future of 2FA? A recent article in the Silicon Valley ...
Blog Entry by Teresa Law | 28 May 2014 | 0 comments
The Bitly breach is another example how insecure passwords are, and the value of two-factor authentication. In the article Bitly embraces two-factor authentication after data breach ...
Blog Entry by Teresa Law | 13 May 2014 | 0 comments