Video Screencast Help

Identity and Authentication Services

Results for Identity and Authentication Services

According to a recent iPass Mobile Enterprise Report , iPhones are now more popular in enterprises than Blackberry and Android phones. With the growing popularity of iPhones and iPads in the workplace, it’s important that these tools have high quality ...
Blog Entry by Marty Jost | 24 Feb 2012 | 2 comments
This past year provided many important lessons in online security and protection. Based on these lessons and because of the numerous cyberattacks and threats in 2011, many organizations and businesses are currently revamping their online security ...
Blog Entry by Marty Jost | 09 Feb 2012 | 3 comments
    In the same way, the cloud emerged from software virtualization, cloud security can only emerge from the process of virtualizing security itself. As virtualization separated software from hardware, allowing enterprise software to freely ...
Blog Entry by nicolas_popp | 05 Feb 2012 | 0 comments
The News On January 31st, Symantec released a new version of Symantec™ Validation and ID Protection Service (VIP) (formerly VeriSign® Identity Protection Authentication Service) into production. As Symantec VIP is a cloud-based service, this new ...
Blog Entry by Brendon Wilson | 04 Feb 2012 | 0 comments
  Mobile wallet technology has once again become a hot topic in recent days, particularly around the potential security considerations related to these apps. The unavoidable truth is that whenever money is involved, mischief is sure to follow. I ...
Blog Entry by Brendon Wilson | 13 Dec 2011 | 7 comments
Every so often in technology, new trends emerge to drive large changes to society by transforming our established computing paradigms. Cloud as a computing pattern is certainly not dissimilar. The cloud carries in itself all the genes of disruption that ...
Blog Entry by nicolas_popp | 12 Jul 2011 | 0 comments
  Last week, the Australian online edition of CIO magazine published a great set of questions your CEO should be asking IT staff about replacing their existing strong authentication solution. Three key questions in the article are particularly ...
Blog Entry by Brendon Wilson | 04 Jul 2011 | 0 comments
  Given the events of the past 3 months, many of our customers have consulted us regarding mitigating the impact to their environment of the RSA SecurID breach. With the revelation that a breach at a major US defense contractor was perpetrated as a ...
Blog Entry by Brendon Wilson | 08 Jun 2011 | 0 comments
...on behalf of Kerry Loftus, senior director of product management, User Authentication. RSA SecurID has a long history and the recent events have been shocking for anyone in the security industry.  While the details of the RSA breach have still not ...
Blog Entry by Christina Rohall | 07 Jun 2011 | 0 comments
Numerous headlines about a massive spear phishing attack  on top U.S. officials’ Gmail accounts hit earlier today alongside articles covering the ensuing Weinergate  “ordeal,” leaving many to wonder, “Could this happen to me?” If you use a standard ...
Blog Entry by Christina Rohall | 02 Jun 2011 | 0 comments