White Papers

HID Global – Physical Security on the Edge

While traditional solutions for integrating physical and logical access have historically been intrusive, difficult to deploy and very costly, a new generation of access control solutions that are IP-enabled are paving the way for organizations to make what once was a futuristic scenario, a viable reality. HID Global is meeting these security challenges head on with its new Edge™ Family of IP-based access solutions.

maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.

Mail-SeCure – A Complete Perimeter Security Solution

Protecting ones network from hostile attacks has become a full time job. Especially today, when networks have become an easy target for hackers, intruders, abusers, Email Viruses, Worms, Trojan-horses, Phishing, Spam and DoES (Denial of Email Service).

Two-Factor Authentication Without Tokens: PhoneFactor ™

For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is only continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying usernames and passwords for authentication is insufficient. While two-factor authentication is an effective security solution, traditional token-based systems have been difficult to implement and administer, leading to limited adoption.

Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge.

SSO Over the Internet: The CISO’s Misperceptions and Realities

Ping Identity conducted anonymous interviews of seventeen Chief Information Security Officers (CISOs) and Information Security Officers across financial services, healthcare, education, insurance and business services. What we learned was surprising: many of the survey participants share three common misperceptions about secure Internet single sign-on (SSO).

Federated Provisioning: The Synergy of Identity Federation and User Provisioning

This paper provides a background of federation and provisioning concepts, functional operations, and standards. A complex provisioning use case is presented to demonstrate the potential combination of SPML and SAML in a federated environment.

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy: Privaris

The modern world has an unprecedented need for security. More than ever before, sensitive information, ranging from personal account numbers to government intelligence, is stored in databases that can be accessed via the Internet, cellular phones, and other networks. This information is a target for those who wish to exploit it for illegal purposes.

A Practical Approach to Managing Phishing: Paypal

Surely only a few individuals, who have been living a life of seclusion on the French Riviera for the last few years, won’t know what the crime of “phishing” is. At least that’s what we tend to think in the security industry. Yet, according to Gartner estimates, 3.3% of the 124 million consumers who received phishing email last year were victimized and lost money because of the attacks.

Physical Security in Mission Critical Facilities: APC

Physical security — controlling personnel access to facilities — is critical to achieving data center availability goals. As new technologies such as biometric identification and remote management of security data become more widely available, traditional card-and-guard security is being supplanted by security systems that can provide positive identification and tracking of human activity in and around the data center.

Digital Edition

  • Security Today Magazine - October 2020

    October 2020


    • No Touch, Low Touch
    • Going the Distance
    • Accelerating Security
    • Bringing Rapid Identification
    • Shifting Strategies

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety