RSS feed Get our RSS feed

News by Topic

authentication deployments

Results 1 - 2 of 2Sort Results By: Published Date | Title | Company Name
By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : authentication, byod, mobile workforce, it security, key management
     SafeNet
By: SafeNet     Published Date: Jun 03, 2013
An effective strong authentication service enables companies to pursue a consistent authentication policy, across the organization, by automating and simplifying the deployment and management of a distributed estate of tokens.
Tags : authentication, authentication deployments, managing authentication
     SafeNet
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics