Security token

Results: 1367



#Item
81Computer access control / Federated identity / Security token / Identity management / Single sign-on / Imprivata / Smart card / Authentication / Password / Multi-factor authentication / Password manager

SafeSign Identity Client & Imprivata Strong authentication and Single Sign On OneSign Single Sign On (SSO) Password security and access

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:28
82Remote desktop / Computer access control / Citrix Systems / XenApp / Smart card / Multi-factor authentication / Security token / Password manager / Single sign-on / Card reader / Authentication / Access token

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
83Cross-platform software / Optimizely / Functional languages / Scripting languages / Concurrent programming languages / Object-oriented programming languages / JavaScript / Security token / Experiment / Java

Optimizely Headline Testing Technical Implementation Guide 631 HOWARD ST. #100 SAN FRANCISCO, CA 94105

Add to Reading List

Source URL: blog.optimizely.com

Language: English - Date: 2015-05-20 18:31:10
84Mobile telecommunications / Wireless / Radio-frequency identification / Near Field Communications / Automatic identification and data capture / Near field communication / TecTile / Internet of things / Mobile RFID / Security token / Mobile phone / QR code

Smartphones Editor: Roy Want n Google n Near Field Communication Roy Want

Add to Reading List

Source URL: www.roywant.com

Language: English - Date: 2016-03-05 20:07:31
85Computer access control / Cryptography / Computer network security / Smart card / Ubiquitous computing / Authentication / Computer security / Mobile device / IPhone / Security token

Mobility in Healthcare Easy access and control of medical information Secure Identification in Healthcare

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
86Computer access control / Online banking / Security token / Token / Bank

Form valid fromCONFIRMATION FORM – RECEIVING DOCUMENTS/SAFETY DEVICES TO ACCESS ONLINE BANKING SERVICE FOR INDIVIDUALS I. CUSTOMER INFORMATION FULL NAME

Add to Reading List

Source URL: www.alphaclick.ro

Language: English - Date: 2014-03-24 09:51:54
87Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
88Payment systems / Key management / Public key infrastructure / Public-key cryptography / Computer access control / Voucher / School voucher / Certificate authority / Smart card / Security token / Public key certificate / Credit card

IdenTrust Global Common (IGC) VOUCHER ORDER FORM Use this form to purchase 5+ IdenTrust Global Common (IGC) vouchers if using a credit card, or 1+ if using a purchase order for payment.  

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-03-04 17:45:08
89Ubiquitous computing / Computer storage devices / Smart cards / ISO standards / Computer access control / Security token / Radio-frequency identification / Card reader / Secure Digital / USB / Contactless smart card / Common Access Card

the company identity management charismathics user conveniance

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:19:21
90

DATA SHEET uTrust Token Standard Mobile Security under Your Control

Add to Reading List

Source URL: files.identiv.com

Language: English - Date: 2016-04-19 09:22:55
    UPDATE