Search Results for: smart card

BlackBerry Smart Card Reader Security
Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.

BlackBerry

Best Practices When Enabling Smart Card Authentication
When implementing an analog KVM solution, enabling users to employ smart cards for the purpose of accessing servers should not be a daunting task.

Raritan Inc.

Authentication Tokens: The Key to Secure PCs and Data
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.

Aladdin Knowledge Systems

Preparing for Intergrated Physical and Logical Access Control: The Common Authenticator
This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.

ADT

SonicWALL PCI Compliance Solution Brief
The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

SonicWALL

Best Practices for mobile authentication
Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

TechTarget Security

Digital secure remote payment: How Apple Pay can change the future of remote payments
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

TechTarget ComputerWeekly.com

E-Guide: Are 'strong authentication' methods strong enough for compliance?
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.

TechTarget Security

Mobile NFC in Retail
This report from the GSMA explains the opportunities for NFC Mobile communications in retail.

TechTarget ComputerWeekly.com