login

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencer’s holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : 
auth0, authentication, scalability, marks and spencers, authentication demand
    
Auth0
Published By: AWS     Published Date: Oct 07, 2019
As companies like yours scale their cloud environment, the question has evolved from “what do I need to protect” to “how do I control and monitor what I am responsible for?” Many companies, especially those who are born on the cloud, or who are more cloud-mature understand the Shared Responsibility Model. Now, they are focusing on building a strategy that gives them greater control and visibility of their cloud environment. Gartner reported that “In 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.” Having the right monitoring strategy is beneficial for multiple reasons, and this eBook will detail how OneLogin implemented it in their AWS environment, and why you should consider implementing it in yours.
Tags : 
    
AWS
Published By: CDW     Published Date: Jun 26, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : 
software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies
    
CDW
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Get the report to find out how smart organizations are using new strategies to simplify IT infrastructures and empower employees to do their best work: • Get advice from Google and Citrix on how to manage the cloud transition strategically • Avoid common cloud work side effects such as excessive application logins, siloed data searches, and channel switching • Capture a vision for how artificial intelligence (AI) and machine learning are making work even more intuitive and personalized
Tags : 
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect
    
Commvault
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
    
Confident Technologies
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business, website, threats, coverage
    
Entrust Datacard
Published By: GeoTrust     Published Date: Jan 21, 2016
Almost every website involves some exchange of information, whether it’s login details for an online application or contact details on a landing page, and visitors want to know that their information is secure. So deploying an SSL certificate from a trustworthy certificate authority (CA) like GeoTrust is a must for any site owner.
Tags : 
    
GeoTrust
Published By: Gigya     Published Date: Jun 20, 2014
As marketers the world over share conflicting stories of social triumph and trial in the pages of leading industry pubs, rumors run rampant across this largely uncharted marketing territory. We’re busting 5 major social marketing myths that have made their way into mainstream marketing lore, and revealing proven facts and strategies to help guide your social efforts and execution.
Tags : 
social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data, increase social engagement, consumer data management, permission based identity, single sign on, social consumer insights, big data marketing, data driven marketing , social marketing, social widget, social network plugin vendors, janrain, social annex
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
To get a look at the current state of data privacy and personalization, Gigya recently commissioned a survey with OnePoll to collect the perspectives of modern consumers. The results reveal that, when it comes to sharing their data with brands, consumers across the globe are demanding 3 key values: transparency, relevance and convenience.
Tags : 
data privacy and personalization, modern consumers, social login, consumer concerns, data privacy, customer experience/engagement
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than just a means to faster registration, and as a key for gaining access to rich, permission-based identity data that drives relevant user experiences. You’ll learn: About the state of social login and latest trends What benefits social login provides for users What value social login can bring to your business Best practices when implementing social login Case studies from leading brands that are using social login
Tags : 
social login, user experience, faster registration, social login benefits, best practices
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security, customer experience/engagement
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
Marketers are struggling to connect with consumers across all available outlets while still providing an aligned customer experience. The white paper examines three key ways to create a successful omni-channel experience while establishing cohesive brand and customer identities. Learn how to: Develop an interactive mobile strategy Streamline physical and digital interactions Engage customers across channels
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security, customer experience/engagement
    
Gigya
Published By: IBM     Published Date: Dec 12, 2006
This case study outlines their success in achieving global simultaneous product launches, correct information for catalogs and advertising, faster price change notifications and better Point of Sale (POS) integration.
Tags : 
data integration, product lifecycle management, information management, sales & marketing software, collaboration, business management, catalogging, catalog, cataloging, product information management, ibm
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
    
IronStratus
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.