Tag results for authentication
sort by: relevance | recent
Results from all user's collections (66 out of ~66)

The results from your search appear low, try our web search for better results.
|
anti counterfeit nfc tag authentication - powered by the qliktag platform
Bookmarked 234 weeks ago the qliktag platform features out of the box support for highly specialized nfc tags purpose built for product authentication and anti-counterfeiting applications the nxp ntag 424 dna authentication nfc tags and the hid global trusted nfc tags can be configured with digital interactions designed within the qliktag platform and configure and end to end solution of all the authentication amp anti counterfeit technology solutions available today this is the most difficult to hack or replicate for counterfeiters for details visit: https:wwwqliktagcomproduct-authentication-2 |
|
hitachi id password manager - mobile user unlocks windows xp password with gina service
Bookmarked 579 weeks ago http:hitachi-idcommobile user unlocks windows xp password with gina servicecontent:- user locks out windows login password- user presses a quothelpquot button to access self-service- a temporary vpn tunnel is established- a kiosk-mode web browser is launched- user enters his network login id- user answers security questions- user chooses a new password- activex updates locally cached password- web browser and vpn are closed- user signs into windows with the new passwordkey concepts:- access to self-service password reset from a locked out windows xp pc- sspr is available even away from the corporate office- sspr impacts locally cached credentials not just on ad dcs- gina dll is not alteredto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml |
|
hitachi id - self-service anywhere
Bookmarked 579 weeks ago http:hitachi-idcomview our webinar from thursday march 31 2011 at 11:00 am mt 1:00 pm et 10:00 am pt where we discussed the recent release of hitachi id password manager and privileged access manager 71this webinar will address recent enhancements and features as well as an overview of the new 039self-service anywhere039 capabilityto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=self-service_anywhere_7-1_release_reviewwmv |
|
docusign mobile for ios 8
Bookmarked 598 weeks ago the global standard for digital transaction management dtm and the 1 rated esignature app on itunes docusign today announced its enhanced mobile app that delivers the ability to quickly and easily sign documents on ios 8 devices with the security of biometric authentication using apple touch id docusigns mobile app is one of the first productivity apps to integrate new capabilities exclusive to apples powerful new mobile operating system to view the multimedia news release go to http:wwwmultivucomplayersenglish7312251-docusign-biometric-authentication-esignature-mobile-app-touch-id-ios-8 |
|
appidnow every company can use sso
Bookmarked 598 weeks ago last week jennifer lawrence and other celebrities had indiscrete photos stolen and distributed across the internet its speculated that their accounts were accessed by a brute force attackwhich can only be successful if their passwords were weak weak passwords are a risk for businesses too verizon found that 76 of all network intrusions exploit weak or stolen passwords to protect critical data every employee at every business must use strong passwords which have no fewer than 12 characters but with an average of 143 apps per business users are likely to take shortcuts by creating passwords that are easy to memorize and easy to crack to view the multimedia news release go to http:wwwmultivucomplayersenglish7286151-intermedia-appid-single-sign-on-passwords-one-click-access |
|
hitachi id password manager - enrolling a lotus notes id file using a shared directory
Bookmarked 579 weeks ago http:hitachi-idcomenrolling a lotus notes id file using a shared directorycontent:- hipm collects copies of user id files and passwords from user pcs- id files are copied to a shared directory- users sign into a web ui to provide the unlocking passwordkey concepts:- automatic enrollment and update of id files- minimal user interaction is required- no client footprintto view more concept animations visit: http:hitachi-idcompassword-manageroverviewconcept-animationshtml |
|
iam in the cloud -- pros cons and architecture
Bookmarked 580 weeks ago http:hitachi-idcomiam in the cloud -- pros cons and architectureguest speaker forrester research inc analyst andras cser and hitachi id systems cto idan shoham discussed what iam in the cloud really means including a variety of deployment scenarios and the pros and cons of each onewe covered the architectural view what organizations are doing in the real world and how we think the intersection of iam in the cloud will evolve in the futureto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=iam_in_the_cloudwmv |
|
request access for a new contractor
Bookmarked 543 weeks ago hitachi-idcomrequest access for a new contractorcontent: this video shows how a manager can request access for a new contractor using a self-service formkey concepts: while employees are normally auto-provisioned based on an hr feed contractors typically are not validation of the request form and routing to authorizers for approval happens next separate recordingssee more at: http:hitachi-idcomidentity-manageroverviewonboardinghtml |
|
hitachi id password manager - unlocking a user who forgot his mcafeesafeboot boot password
Bookmarked 580 weeks ago http:hitachi-idcompassword-managerunlocking a user who forgot his mcafeesafeboot boot passwordcontent:- user forgot the password he must type to unlock his encrypted hard disk- user calls the help desk and is routed to the hitpm server- user identifies and authenticates himself over the telephone- user acts as an intermediary between checkpoint boot software and hitpm passing codes in both directions- user receives and keys in an unlock code enabling him to boot his oskey concepts:- access to key recovery for users with encrypted hard disk- self-service process eliminates help desk calls and offers 24x7 serviceto view more videos about hitachi id password manager visit:http:hitachi-idcompassword-manageroverviewconcept-animationshtml |
|
hitachi id password manager 70 demo
Bookmarked 580 weeks ago http:hitachi-idcomhitachi id password manager 70 demoview our webinar from thursday september 30 2010 at 12:00 pm mdt 11:00 am pt 2:00 pm edt it was an informative webinar on hitachi id password manager 70 hosted by cto idan shohamhitachi id password manager formerly p-synch 70 is a major retooling of the application that provides stronger security better scalability enhanced user adoption and improved roi it leverages hitachi id systems039 latest identity management technology platform with a sql server or oracle back-end a real-time data replication service high performance data updates via stored procedures and unicode supportpassword manager 70 is the first release where telephone-based password and pin reset hitachi id telephone password manager and enterprise single sign-on hitachi id login manager are included in the base product and priceto download this webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=hitachi-id_password-manager-70wmv |
|
update contact information
Bookmarked 543 weeks ago hitachi-idcomupdate contact informationcontent: an employee logs into identity manager and updates his own contact information the request is automatically approvedkey concepts: routine changes for example to personal contact information can be moved from a help desk call to a self-service model access controls determine who can see and who can modify what in whose profile in this case self-service update of contact information is allowed security policy also determines what authorization is required before a change request is completed in this case nonesee more at: http:hitachi-idcomidentity-manageroverviewonboardinghtml |
|
the quotservicequot issue in xr xs amp xs max batteries is apple taking part lock down too far
Bookmarked 342 weeks ago on this episode of the art of repair justin goes over a potentially huge right to repair issue concerning apple batteries could this issue be more widespread and locked down in the next iphoneplease share this videobq27546 chips information sheet from texas instrumentshttps:wwwticomlitdssymlinkbq27546-g1pdfsearch the pdf for 8353concerning excerpt from the pdf below8353 key programming secure memory keythe bq27546-g1 secure-memory authentication key is stored in the secure memory of the bq27546-g1 device ifa secure-memory key has been established only this key can be used for authentication challenges theprogrammable data flash key is not available the selected key can only be establishedprogrammed by specialarrangements with ti using tis secure b-to-b protocol the secure-memory key can never be changed or readfrom the bq27546-g1 fuel gauge8354 executing an authentication queryto execute an authentication query in unsealed mode a host must first write |
|
bodyprint: biometric authentication on smartphones using the touchscreen as a scanner
Bookmarked 566 weeks ago bodyprint is a biometric authentication system that detects users039 biometric features using the capacitive touchscreen as an image scanner bodyprint scans users ears fists phalanges palms and fingers when pressed against the display extracts features and identifies users biometricallymore information at http:wwwchristianholznetbodyprinthtmlbodyprint is a research project bychristian holz http:wwwchristianholznetsenaka buthpitiyamarius knaustyahoo labs californiaabstractrecent mobile phones integrate fingerprint scanners to replace pin codes making authentication more convenient for users however due to their cost fingerprint scanners have been limited to top-of-the-line phones we present bodyprint a biometric authentication system that detects users039 biometric features using the capacitive touchscreen as the image sensor bodyprint scans users ears fists phalanges palms and fingers when pressed against the display bodyprint classified body parts with 9998 accuracy and identifies users with 9952 accuracy with a false rejection rate of 2682 to prevent false positives scanning users039 ears for identification bodyprint achieves 998 authentication precision with a false-rejection rate of 1 out of 13 thereby bringing reliable biometric user authentication to a vast number of commodity devices |
|
free upgrade for current customers of hipm 6x
Bookmarked 579 weeks ago http:hitachi-idcomfree upgrade for current customers of hipm 6xview our webinar from wednesday september 28th 11am mt 10am pt 1pm et on upgrading to 70 the webinar will present and discuss benefits to the no-cost upgradeto view the complete webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=free-upgrade-for-current-customers-of_hipm-6xwmv |
|
designing and deploying a global-scale fault-tolerant privileged access management system
Bookmarked 579 weeks ago http:hitachi-idcomdesigning and deploying a global-scale fault-tolerant privileged access management systemview our webinar from wednesday november 30th 11am mt 10am pt 1pm et when idan shoham presented an informative session on designing and deploying a global-scale fault-tolerant privileged access management system -- this is the same topic as recently presented at the gartner iam show in san diego there was a qampa session after the presentationto view the complete webinar please register at:http:hitachi-idcomcgi-binemaildocdocument=hitachi-id_webinar_designing_and_deploying_a_global-scale_fault-tolerant_pam-systemwmv |














