Get your company's research in the hands of targeted business professionals.
In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
White Paper Published By: ESET
Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
White Paper Published By: Entrust
Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.