Displaying 1 - 5 of 5 results

  • Building the Business Case for Cloud SSO

    White Papers // Dec 2013 // provided by Gemalto

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be ...

    Download Now
  • Identity and Access Management in the Cloud: A Primer

    White Papers // Nov 2013 // provided by Gemalto

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email, ...

    Download Now
  • Two-Factor Authentication for Cloud Applications

    White Papers // Nov 2013 // provided by Gemalto

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the ...

    Download Now
  • A Smarter Way to Store PKI Credentials

    White Papers // Mar 2010 // provided by Gemalto

    Public key infrastructure (PKI) is a proven technology for identity and access management systems that improves IT security and enables secure logon, file encryption, and digital signature for transactions. Other tangible benefits include increased productivity, lower help desk costs for password support and reduced operating expenses due to process enhancements. ...

    Download Now
  • A Protection Scheme for Moc-Enabled Smart Cards

    White Papers // Dec 2006 // provided by Gemalto

    The concept of Match-on-Card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not. ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?