CRYPTOCard

Displaying 1-8 of 8 results

  • White Papers // Nov 2009

    Discovering the True Cost of Buying Authentication

    Computers, and the networks that connect them to each other and their users, have changed enormously over the years from mainframes as big as a house to hand held devices that communicate to web-based applications and from squeaky modems through to high speed VPNs that provide reliable and secure connectivity...

    Provided By CRYPTOCard

  • White Papers // Sep 2009

    The Evolution of Strong Authentication: Towards a Future of Ubiquitous, Secure Digital Identities

    Strong authentication technologies have long been used for providing an extra layer of assurance that an individual accessing computing resources is who they say they are. However, the cost of deploying and managing such systems, including the provisioning of hardware tokens and the strain on helpdesk resources dealing with lost...

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: DC Energy

    DC Energy delivers highly specialized approaches to the energy markets and performs highly targeted analysis of markets within the energy field. It needed to ensure that the integrity and confidentiality of data is maintained. DC Energy deployed CRYPTO-MAS cloud based services that's globally managed authentication service that leverages cloud based...

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: TTT Moneycorp

    TTT Moneycorp is a provider of global money services to private and corporate customers. To maintain this momentum necessitates keeping one step ahead of the competition, and ensuring that any 3rd party systems and applications deployed are quick to implement, and offer flexibility and scalability in anticipation of future requirements....

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: Yorkshire & Humber Grid for Learning

    Yorkshire & Humber Grid for Learning (YHGfL) is a regional body consisting of 12 Local Authority members who in turn consist of over 2000 schools and their partners in learning. YHGfL realised that standard passwords and usernames, the traditional form of user authentication, were not enough to ensure the safety...

    Provided By CRYPTOCard

  • White Papers // Apr 2009

    How Becta's "Data Handling Procedures in Government" Affects Your School

    Remote access and flexible working is becoming a standard practice as organizations take advantage of cost benefits of the internet by providing VPNs (Virtual Private Networks) for employees to access confidential data, resources and applications. Users at all levels now have the ability to access systems from home and other...

    Provided By CRYPTOCard

  • White Papers // Feb 2009

    Is an SSL VPN Really Secure?

    Although an SSL VPN provides excellent remote access capabilities, it is only as secure as the method used to prevent unauthorized access. However, VPN access is increasingly simple for unauthorized users to get hold of a user's credentials and this means that an SSL VPN or any other security solution...

    Provided By CRYPTOCard

  • White Papers // Feb 2009

    Authentication: The Next Factor in Cloud Based Security Services

    There are two recent trends that will be remembered for their impact on organizations and their IT departments - the first is 'credit crunch', the second is 'Cloud Computing'. This paper is primarily focused upon the latter, cloud computing - and how to overcome the security issues raised by users...

    Provided By CRYPTOCard

  • White Papers // Feb 2009

    Is an SSL VPN Really Secure?

    Although an SSL VPN provides excellent remote access capabilities, it is only as secure as the method used to prevent unauthorized access. However, VPN access is increasingly simple for unauthorized users to get hold of a user's credentials and this means that an SSL VPN or any other security solution...

    Provided By CRYPTOCard

  • White Papers // Nov 2009

    Discovering the True Cost of Buying Authentication

    Computers, and the networks that connect them to each other and their users, have changed enormously over the years from mainframes as big as a house to hand held devices that communicate to web-based applications and from squeaky modems through to high speed VPNs that provide reliable and secure connectivity...

    Provided By CRYPTOCard

  • White Papers // Sep 2009

    The Evolution of Strong Authentication: Towards a Future of Ubiquitous, Secure Digital Identities

    Strong authentication technologies have long been used for providing an extra layer of assurance that an individual accessing computing resources is who they say they are. However, the cost of deploying and managing such systems, including the provisioning of hardware tokens and the strain on helpdesk resources dealing with lost...

    Provided By CRYPTOCard

  • White Papers // Apr 2009

    How Becta's "Data Handling Procedures in Government" Affects Your School

    Remote access and flexible working is becoming a standard practice as organizations take advantage of cost benefits of the internet by providing VPNs (Virtual Private Networks) for employees to access confidential data, resources and applications. Users at all levels now have the ability to access systems from home and other...

    Provided By CRYPTOCard

  • White Papers // Feb 2009

    Authentication: The Next Factor in Cloud Based Security Services

    There are two recent trends that will be remembered for their impact on organizations and their IT departments - the first is 'credit crunch', the second is 'Cloud Computing'. This paper is primarily focused upon the latter, cloud computing - and how to overcome the security issues raised by users...

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: DC Energy

    DC Energy delivers highly specialized approaches to the energy markets and performs highly targeted analysis of markets within the energy field. It needed to ensure that the integrity and confidentiality of data is maintained. DC Energy deployed CRYPTO-MAS cloud based services that's globally managed authentication service that leverages cloud based...

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: TTT Moneycorp

    TTT Moneycorp is a provider of global money services to private and corporate customers. To maintain this momentum necessitates keeping one step ahead of the competition, and ensuring that any 3rd party systems and applications deployed are quick to implement, and offer flexibility and scalability in anticipation of future requirements....

    Provided By CRYPTOCard

  • Case Studies // Jul 2009

    CRYPTOCard Case Study: Yorkshire & Humber Grid for Learning

    Yorkshire & Humber Grid for Learning (YHGfL) is a regional body consisting of 12 Local Authority members who in turn consist of over 2000 schools and their partners in learning. YHGfL realised that standard passwords and usernames, the traditional form of user authentication, were not enough to ensure the safety...

    Provided By CRYPTOCard