PhoneFactor

Displaying 1-5 of 5 results

  • White Papers // Sep 2012

    Guide to Evaluating Multi-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Dec 2011

    The Case for Phone Based Authentication: Jumping on the Out-of-Band Wagon

    Many enterprises are proactively re-evaluating their strategies for authenticating end-users with methods that are stronger than traditional passwords, and solution providers are responding by developing innovative options for authentication that leverage what is arguably the most personal, indispensable and ubiquitous of all mobile devices – the mobile phone. This Analyst...

    Provided By PhoneFactor

  • White Papers // Jun 2011

    2011 FFIEC Authentication Guidance: A New Standard For Online Banking Security

    The long overdue update to the FFIEC Guidance on Authentication in an Internet Banking Environment, released in June 2011, sets a new standard for online banking security. Since the last update in 2005, the online banking threat landscape has changed dramatically, creating a significant gap between the FFIEC recommendations and...

    Provided By PhoneFactor

  • White Papers // Jan 2011

    Guide to Evaluating Two-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • Webcasts // Apr 2009

    Live Event: PCI DSS Compliance In Action: Regis Corporation

    Are you charged with the daunting task of managing your company's PCI DSS (Payment Card Industry Data Security Standard) compliance? If so, don't miss this live TechRepublic Webcast with real-world stories from industry leaders. Hosted by James Hilliard for TechRepublic and featuring guest speakers Steve Dispensa, Data Security Expert,...

    Provided By PhoneFactor

  • White Papers // Sep 2012

    Guide to Evaluating Multi-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • White Papers // Dec 2011

    The Case for Phone Based Authentication: Jumping on the Out-of-Band Wagon

    Many enterprises are proactively re-evaluating their strategies for authenticating end-users with methods that are stronger than traditional passwords, and solution providers are responding by developing innovative options for authentication that leverage what is arguably the most personal, indispensable and ubiquitous of all mobile devices – the mobile phone. This Analyst...

    Provided By PhoneFactor

  • White Papers // Jun 2011

    2011 FFIEC Authentication Guidance: A New Standard For Online Banking Security

    The long overdue update to the FFIEC Guidance on Authentication in an Internet Banking Environment, released in June 2011, sets a new standard for online banking security. Since the last update in 2005, the online banking threat landscape has changed dramatically, creating a significant gap between the FFIEC recommendations and...

    Provided By PhoneFactor

  • White Papers // Jan 2011

    Guide to Evaluating Two-Factor Authentication Solutions

    Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication...

    Provided By PhoneFactor

  • Webcasts // Apr 2009

    Live Event: PCI DSS Compliance In Action: Regis Corporation

    Are you charged with the daunting task of managing your company's PCI DSS (Payment Card Industry Data Security Standard) compliance? If so, don't miss this live TechRepublic Webcast with real-world stories from industry leaders. Hosted by James Hilliard for TechRepublic and featuring guest speakers Steve Dispensa, Data Security Expert,...

    Provided By PhoneFactor