Anakam

Results: 61



#Item
31Identity management / Access control / Authentication / Notary / Packaging / Multi-factor authentication / Password / Mobile payment / Anakam / Security / Computer security / Cryptography

BUILDING TRUSTED IDENTITY NETWORKS WWW.SECUREKEY.COM All around the world, people are managing dozens of increasingly complex online login IDs. And you’re probably one of these people. Trying to remember them all can

Add to Reading List

Source URL: securekey.com

Language: English - Date: 2014-04-25 01:16:57
32Two-factor authentication / Internet protocols / Security token / Password / Authentication / AKA / Symantec / Anakam / Password manager / Cryptography / Security / Computer security

PARTNER BRIEF: STRONG, SMARTER USER AUTHENTICATION ........................................ Effective, User-Friendly Solution Addresses Security Challenges of Today’s Mobile Business

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-22 07:19:00
33Data security / Password / Authentication / One-time password / Information security / Two-factor authentication / Anakam / Security / Computer security / Cryptography

CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland[removed]Risk Management Handbook

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-12-03 10:11:05
34Access control / Computer network security / Authentication / Authorization / Federated identity management / Anakam / Security / Computer security / Identity management

IDENTITY AND ACCESS MANAGEMENT Securing Networked Infrastructure for the Energy Sector

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-30 15:14:51
35Access control / Computer network security / Authentication / Authorization / Federated identity management / Anakam / Security / Computer security / Identity management

IDENTITY AND ACCESS MANAGEMENT Securing Networked Infrastructure for the Energy Sector

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2013-12-10 12:16:31
36Access control / Computer network security / Authentication / Authorization / Federated identity management / Anakam / Security / Computer security / Identity management

IDENTITY AND ACCESS MANAGEMENT Securing Networked Infrastructure for the Energy Sector

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2013-12-10 12:16:31
37Anakam / Two-factor authentication / Multi-factor authentication / Authentication / AKA / Password / Data security / Biometrics / Security token / Security / Access control / Cryptography

Progressive authentication integrated into Equifax Identity Proofing  R eal time fraud prevention at registration, login, and other transactions.

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2014-03-25 15:20:21
38Public safety / Identity management / Computer security / Access control / Identity assurance / Information security / Authentication / Two-factor authentication / Anakam / Security / Crime prevention / National security

ANDREW M. CUOMO Governor STATE OF NEW YORK State Capitol P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-01-24 17:01:23
39Identity management / Authentication / Identity theft / Provisioning / Cloud computing / Federated identity management / Anakam / Security / Identity / Computer security

Identity and risk management

Add to Reading List

Source URL: www.cgi.com

Language: English - Date: 2012-02-27 12:24:02
40Credit rating agencies / Identity / Access control / Anakam / Equifax / Identity management / Data security / Authentication / Multi-factor authentication / Security / Financial economics / Computer security

Identity and Fraud Solutions Key benefits > Use one platform to integrate with existing applications and manage identity and fraud mitigation

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2013-02-19 11:47:05
UPDATE