VASCO Data Security

Displaying 1-6 of 6 results

  • White Papers // Jul 2009

    Digipass and PKI

    This paper is intended for companies and financial institutions that are considering setting up a Public Key Infrastructure (PKI) or those that already utilize Digipass technology for authentication and secure transactions. This paper explains the different ways Digipass technology can be used to help resolve some of the common problems...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution for On-Demand Applications and SaaS

    Software deployments are shifting from a traditional approach where programs are installed on individual computers towards a web model. With the increased performance, availability, and stability of the current Internet infrastructure, other software deployments have become possible, such as Hosted Applications. Better known as "SaaS" or "On-Demand", these applications reside...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution Against MITM Attacks for e-Banking

    As the global leader in two-factor authentication solutions for the financial industry, VASCO Data Security provides mature technology that has minimal impact on IT architecture, is designed to complement existing security policies, and has been refined by years of experience in the world's largest deployments in the banking sector. Identikey...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution for Enterprise Security

    Nowadays, every company is dependent on the Internet in their day-to-day operations, so security concerns are valid and have to be addressed. Regular static passwords are the weakest link in any security infrastructure, as they can easily be guessed, copied, exchanged, shared, and misused. Simple passwords are easy to remember...

    Provided By VASCO Data Security

  • White Papers // Mar 2009

    Vacman Controller: HSM Integration Guide

    The Vacman Controller allows the verification of passwords and signatures generated by a DIGIPASS. To verify these passwords, the Vacman Controller needs access to the parameters and secrets that were programmed in the DIGIPASS. The Vacman Controller will store this information in what is called the DIGIPASS Blob. The DIGIPASS...

    Provided By VASCO Data Security

  • White Papers // Mar 2009

    Vacman Controller: Integration Guide

    This White Paper guides one through the different steps that are required to integrate the Vacman Controller inside application. There is no need to break open application or rewrite application from scratch. After reading this paper one will understand how the Vacman Controller interacts with application and how it allows...

    Provided By VASCO Data Security

  • White Papers // Mar 2009

    Vacman Controller: HSM Integration Guide

    The Vacman Controller allows the verification of passwords and signatures generated by a DIGIPASS. To verify these passwords, the Vacman Controller needs access to the parameters and secrets that were programmed in the DIGIPASS. The Vacman Controller will store this information in what is called the DIGIPASS Blob. The DIGIPASS...

    Provided By VASCO Data Security

  • White Papers // Mar 2009

    Vacman Controller: Integration Guide

    This White Paper guides one through the different steps that are required to integrate the Vacman Controller inside application. There is no need to break open application or rewrite application from scratch. After reading this paper one will understand how the Vacman Controller interacts with application and how it allows...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution for On-Demand Applications and SaaS

    Software deployments are shifting from a traditional approach where programs are installed on individual computers towards a web model. With the increased performance, availability, and stability of the current Internet infrastructure, other software deployments have become possible, such as Hosted Applications. Better known as "SaaS" or "On-Demand", these applications reside...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution Against MITM Attacks for e-Banking

    As the global leader in two-factor authentication solutions for the financial industry, VASCO Data Security provides mature technology that has minimal impact on IT architecture, is designed to complement existing security policies, and has been refined by years of experience in the world's largest deployments in the banking sector. Identikey...

    Provided By VASCO Data Security

  • White Papers // Apr 2009

    Identikey Server 3.1: Strong Authentication Solution for Enterprise Security

    Nowadays, every company is dependent on the Internet in their day-to-day operations, so security concerns are valid and have to be addressed. Regular static passwords are the weakest link in any security infrastructure, as they can easily be guessed, copied, exchanged, shared, and misused. Simple passwords are easy to remember...

    Provided By VASCO Data Security

  • White Papers // Jul 2009

    Digipass and PKI

    This paper is intended for companies and financial institutions that are considering setting up a Public Key Infrastructure (PKI) or those that already utilize Digipass technology for authentication and secure transactions. This paper explains the different ways Digipass technology can be used to help resolve some of the common problems...

    Provided By VASCO Data Security