Cloud services

Password authentication News

View All News

Password authentication Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Password authentication Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Why a healthcare SSO platform is a must-have

    By using the single-sign on product installed at their workplace, healthcare professionals can quickly log on to multiple applications without much hassle. Continue Reading

  • Can facial recognition authentication improve mobile security?

    MasterCard is testing a new facial recognition authentication system for mobile payments. Expert Michael Cobb explains how it works, and what it means for users. Continue Reading

  • The best endpoint security approach in this interconnected age

    Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these various approaches (whitelisting, sandboxing and so on) working out? And could the cloud possibly be the best endpoint security solution in today's mobile age? This handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security in the future.

    SearchSecurity contributors examine the question of how best to secure endpoints, and provide actionable advice. Karen Scarfone questions the all-too-common assumption that using the cloud undermines security, and also outlines specific ways in which cloud-based tools can be useful in improving endpoint security. In a separate chapter, Scarfone considers whether the best endpoint security is achieved by combining tools and methods -- that is, by using an endpoint security suite. Ed Tittel focuses on the threat to endpoint security from malware and how antimalware tools can beef up defenses, offering scenarios that show how antimalware products work to secure endpoints. Continue Reading

View All Evaluate

Manage Password authentication

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Password authentication Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close