Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
12 Results for 'Authentication'
Blog

By Sam Murphy

November 29, 2018

PSD2 and Open Banking are all about making the European financial industry more customer-centric – while ensuring a secure environment. Enabling secure, easy digital payments will be paramount to success in an industry on the brink of digital disruption.
Blog

By Jacquelyn Painter

October 16, 2018

Did you know that 53% of firms use four or more types of authentication to identify internal users?
Blog

By Barry McArthur

November 19, 2019

The report is designed to help organizations find the technology providers with the best overall product, functionality, innovation and market vision for this category.
Blog

By Jacquelyn Painter

July 17, 2018

As we are already halfway through the 2018 calendar year, the 2019 PSD2 required implementation for strong authentication will be here before you know it. 
Blog

By Sandra Carielli

June 12, 2018

Big data analytics enables a new behavior-based authentication evolution for easier and more robust identity management. 
Blog

By Juan C. Asenjo | Thales eSecurity Global Partner Marketing

June 19, 2018

Big data analytics enables a new behavior-based authentication evolution for easier and more robust identity management. 
Blog

By Jacquelyn Painter

April 15, 2019

At Entrust Datacard, we’ve made it our goal to demonstrate how choosing a smarter authentication approach can help you face this challenge head-on while giving you back some much-deserved “you time.”
Blog

By Rajan Barara

April 23, 2018

Now, MFA is a new commodity. Is a basic MFA, Federation, or SSO solution enough for your organization? 
Blog

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Blog

By Jean-Louis Meyer

August 20, 2019

Elements of strong authentication moving towards more flexible enforcement
Page 1 of 2