PhoneFactor

Displaying 1-9 of 9 results

  • White Papers // Sep 2012

    Guide to Evaluating Multi-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Jan 2012

    The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

    According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication.

    Provided By PhoneFactor

  • White Papers // Dec 2011

    The Case for Phone Based Authentication: Jumping on the Out-of-Band Wagon

    Many enterprises are proactively re-evaluating their strategies for authenticating end-users with methods that are stronger than traditional passwords, and solution providers are responding by developing innovative options for authentication that leverage what is arguably the most personal, indispensable and ubiquitous of all mobile devices – the mobile phone. This Analyst...

    Provided By PhoneFactor

  • White Papers // Jun 2011

    2011 FFIEC Authentication Guidance: A New Standard For Online Banking Security

    The long overdue update to the FFIEC Guidance on Authentication in an Internet Banking Environment, released in June 2011, sets a new standard for online banking security. Since the last update in 2005, the online banking threat landscape has changed dramatically, creating a significant gap between the FFIEC recommendations and...

    Provided By PhoneFactor

  • White Papers // Jan 2011

    Guide to Evaluating Two-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Dec 2010

    The Authentication Revolution:Phones Become the Leading Multi-Factor Authentication Device

    Escalating IT security threats and strengthening regulatory requirements are driving adoption of multi-factor authentication to unprecedented levels. Increasingly, new and expanded multi-factor implementations are leveraging phone-based authentication instead of security tokens, which had previously dominated the multi-factor market. According to Goode Intelligence, an information security research and analysis firm, phone-based...

    Provided By PhoneFactor

  • Webcasts // Apr 2009

    Live Event: PCI DSS Compliance In Action: Regis Corporation

    Are you charged with the daunting task of managing your company's PCI DSS (Payment Card Industry Data Security Standard) compliance? If so, don't miss this live TechRepublic Webcast with real-world stories from industry leaders. Hosted by James Hilliard for TechRepublic and featuring guest speakers Steve Dispensa, Data Security Expert,...

    Provided By PhoneFactor

  • White Papers // Jan 2009

    Tokenless Two-Factor Authentication: It Finally Adds Up

    Securing access to sensitive corporate and customer data is critical, especially in industries that require a regulatory-compliant environment. While two-factor authentication is an effective security solution, traditional two-factor systems have been difficult to implement and administer, leading to limited adoption. PhoneFactor uses any mobile phone (or landline) as the second...

    Provided By PhoneFactor

  • White Papers // Dec 2008

    Security For Online Banking That Users Want and Will Pay For

    A recent Harris Interactive study of online banking customers reveals important information about how customers perceive the current level of security provided by their financial institutions and their willingness to adopt additional security measures. Key findings include: Consumers perceive significant weakness in online banking safety. 64% of those surveyed...

    Provided By PhoneFactor

  • White Papers // Sep 2012

    Guide to Evaluating Multi-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Dec 2011

    The Case for Phone Based Authentication: Jumping on the Out-of-Band Wagon

    Many enterprises are proactively re-evaluating their strategies for authenticating end-users with methods that are stronger than traditional passwords, and solution providers are responding by developing innovative options for authentication that leverage what is arguably the most personal, indispensable and ubiquitous of all mobile devices – the mobile phone. This Analyst...

    Provided By PhoneFactor

  • White Papers // Jun 2011

    2011 FFIEC Authentication Guidance: A New Standard For Online Banking Security

    The long overdue update to the FFIEC Guidance on Authentication in an Internet Banking Environment, released in June 2011, sets a new standard for online banking security. Since the last update in 2005, the online banking threat landscape has changed dramatically, creating a significant gap between the FFIEC recommendations and...

    Provided By PhoneFactor

  • White Papers // Jan 2011

    Guide to Evaluating Two-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Jan 2012

    The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

    According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication.

    Provided By PhoneFactor

  • Webcasts // Apr 2009

    Live Event: PCI DSS Compliance In Action: Regis Corporation

    Are you charged with the daunting task of managing your company's PCI DSS (Payment Card Industry Data Security Standard) compliance? If so, don't miss this live TechRepublic Webcast with real-world stories from industry leaders. Hosted by James Hilliard for TechRepublic and featuring guest speakers Steve Dispensa, Data Security Expert,...

    Provided By PhoneFactor

  • White Papers // Jan 2009

    Tokenless Two-Factor Authentication: It Finally Adds Up

    Securing access to sensitive corporate and customer data is critical, especially in industries that require a regulatory-compliant environment. While two-factor authentication is an effective security solution, traditional two-factor systems have been difficult to implement and administer, leading to limited adoption. PhoneFactor uses any mobile phone (or landline) as the second...

    Provided By PhoneFactor

  • White Papers // Dec 2008

    Security For Online Banking That Users Want and Will Pay For

    A recent Harris Interactive study of online banking customers reveals important information about how customers perceive the current level of security provided by their financial institutions and their willingness to adopt additional security measures. Key findings include: Consumers perceive significant weakness in online banking safety. 64% of those surveyed...

    Provided By PhoneFactor

  • White Papers // Dec 2010

    The Authentication Revolution:Phones Become the Leading Multi-Factor Authentication Device

    Escalating IT security threats and strengthening regulatory requirements are driving adoption of multi-factor authentication to unprecedented levels. Increasingly, new and expanded multi-factor implementations are leveraging phone-based authentication instead of security tokens, which had previously dominated the multi-factor market. According to Goode Intelligence, an information security research and analysis firm, phone-based...

    Provided By PhoneFactor