Mobile identity management

Results: 229



#Item
61Identity Management ABC4Trust Panel @ TDW Event Ahmad Sabouri Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe University Frankfurt

Identity Management ABC4Trust Panel @ TDW Event Ahmad Sabouri Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe University Frankfurt

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 07:35:36
62Canary Wharf metro Station, London, England, UK

Canary Wharf metro Station, London, England, UK

Add to Reading List

Source URL: www.teleware.com

Language: English - Date: 2015-03-17 10:39:18
63Usher 2.2  Usher Mobile Identity Platform Usher™ is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterpris

Usher 2.2 Usher Mobile Identity Platform Usher™ is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterpris

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-11-18 10:40:30
64Global privacy sweep raises mobile app concerns 11 September 2014 Nearly one third (31 percent) of all mobile apps raise concerns about the nature of permissions sought, a global sweep of mobile apps has found. One in th

Global privacy sweep raises mobile app concerns 11 September 2014 Nearly one third (31 percent) of all mobile apps raise concerns about the nature of permissions sought, a global sweep of mobile apps has found. One in th

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:15:03
65Bicycle Network Privacy Policy 1. General a. The Bicycle Network website (site), mobile applications and devices, apps and other internet accessible services (collectively, the Internet Services)

Bicycle Network Privacy Policy 1. General a. The Bicycle Network website (site), mobile applications and devices, apps and other internet accessible services (collectively, the Internet Services)

Add to Reading List

Source URL: www.bicyclenetwork.com.au

Language: English - Date: 2015-03-23 22:04:01
66SOLUTION OVERVIEW  THE CLEARPASS ACCESS MANAGEMENT SYSTEM™ Remember when IT was the gatekeeper of everything

SOLUTION OVERVIEW THE CLEARPASS ACCESS MANAGEMENT SYSTEM™ Remember when IT was the gatekeeper of everything

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2014-07-22 09:09:47
67WHITE PAPER  Usher Mobile Identity Platform Security Architecture  For more information, visit

WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-10-01 13:22:05
68Email / Ethics / Identity management / Social issues / Privacy / Personally identifiable information / HTTP cookie / Google / Web bug / Computing / Internet / Internet privacy

Terms of Use Terms of Service Roam ("Roam" or "we"), operates the website located at www.getroam.co (the "Site"), and provides services offered through the Site and related mobile applications (collectively, the "Service

Add to Reading List

Source URL: www.getroam.co

Language: English - Date: 2015-03-26 13:23:41
69Spend Management Tools Spend Management tools are services or functionalities that we offer you to assist you with managing your service expenditure and service usage. These tools include: Control tool

Spend Management Tools Spend Management tools are services or functionalities that we offer you to assist you with managing your service expenditure and service usage. These tools include: Control tool

Add to Reading List

Source URL: www.bendigobanktelco.com.au

Language: English - Date: 2014-04-15 03:43:02
70Millions of smart phones and consumer grade devices bundled with retail voice and data plans are implemented in the enterprise space every year. These devices are easily broken or destroyed if they get wet or dropped and

Millions of smart phones and consumer grade devices bundled with retail voice and data plans are implemented in the enterprise space every year. These devices are easily broken or destroyed if they get wet or dropped and

Add to Reading List

Source URL: www.racoindustries.com

Language: English - Date: 2013-05-28 14:27:51