strong authentication

Results 1 - 25 of 42Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Sep 04, 2019
Key considerations when developing a strong and customer-friendly approach to intelligent authentication. Bank fraud is on the rise. In fact, according to a recent survey of 43 major banks around the world, it’s not just the number of fraud cases that is going up; so, too, is the value of fraud overall. In large part, this increase in fraud is the result of identity theft scams. Rather than attempting some sort of high-stakes virtual bank heist for all the gold in the vault, most online thieves seem content simply stealing money from every-day customer’s accounts when they aren’t looking.
Tags : 
    
KPMG
Published By: Iovation     Published Date: Aug 02, 2019
Aite Group’s second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : 
payment services directive, psd2 regulation
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Learn about the second Payment Services Directive (PSD2), and its expected impacts on the payment services and e-commerce market. Find out what you need to prepare to handle the new strong customer authentication (SCA) requirements under the PSD2.
Tags : 
what is psd2, sca requirements, data privacy, privacy by design, pseudonymization
    
Iovation
Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe
Published By: Stripe     Published Date: Jun 11, 2019
Analyst firm 451 Research interviewed 500 businesses and 1,000 consumers and found that Europe's online economy risks losing €57 billion when Strong Customer Authentication (SCA) goes into effect on 14 September. SCA is intended to reduce fraud rates and enhance the overall security of online payments. But what does this mean for businesses and how can they best accommodate these new requirements in order to limit the financial impact? Download the report to find out.
Tags : 
sca, online economy, online payment
    
Stripe
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication
    
CA Technologies
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Learn why mobile is the future of enterprise authentication. Discover how mobile: • Elicits stronger, more convenient authentication • Promotes quicker and better user adoption • Future-proofs your organization
Tags : 
    
Entrust Datacard
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
Entrust Datacard
Published By: Intel Corp.     Published Date: Nov 21, 2017
This white paper provides an overview how banks seek to stop fraud in its tracks with simpler, stronger authentication.
Tags : 
    
Intel Corp.
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Imprivata
Published By: FICO     Published Date: Sep 12, 2017
PSD2 aims to tackle payments fraud and Strong Customer Authentication is the weapon of choice. Unfortunately, Strong Customer Authentication has a downside, it increases the burden on customers who must prove they are the legitimate account holder more often.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : 
entrust, homeland security, frac, identification standards, first responder
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance
Tags : 
entrust, healthcare, cms systems, medicare, medicaid
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : 
identity, authentication, first responders, u.s. homeland security, frac
    
Entrust Datacard
Previous   1 2    Next    
Search