VASCO Data Security

Our Website:

Latest Content From VASCO Data Security

Whitepaper: Transform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"

by VASCO Data SecurityJul 15, 2012

For decades, organizations have been striving to extend the reach of their identity protection solutions while trying to balance security, cost, and ease of use. Many CIOs have looked to understand how to improve the security of each and every online user, at home, at work, and on the go. Nowadays, with online hacks, data breaches, and compromised accounts reported almost weekly, protecting online identities and accounts becomes even more pressing.

In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application.

Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."

Whitepaper: Discover How to Bring Trust to the Cloud: Strong Authentication for SaaS Applications

by VASCO Data SecurityJul 15, 2012

B2B applications is one of the markets quickly moving to a SaaS model due to lower deployment costs, quick time to market and unlimited accessibility. However, the same exact benefits of the SaaS delivery model that are driving the trend may actually slow down further adoption of the SaaS applications by the enterprises. Why do IT departments get skeptical about moving their mission-critical applications and data into the cloud? The answer is quite simple; security concerns are increasingly cited among the reasons for slower adoption of SaaS.

As a SaaS provider, you very well know that offering services in the cloud can be both rewarding and challenging at the same time. You clearly have a competitive advantage over the traditional application providers by offering rapid deployment, requiring fewer resources, and reducing overall cost of a software solution. How do you overcome the security challenge?

Read more of this strategy guide to explore how strong authentication can actually be an argument in favor of SaaS adoption. You will learn how to:

� Efficiently secure access to your SaaS application

� Gain competitive advantage over other SaaS providers

� Improve customer acquisition rates

� Avoid account sharing between users and subsequent revenue loss

� Manage and control user access from anywhere, at any time

� Satisfy regulatory compliance

Whitepaper: Forget the "Token Necklace": Discover How Identity Federation Can Simplify User Experience and Increase Security

by VASCO Data SecurityJul 15, 2012

Many of the accounts and applications we use on a daily basis require multi-factor authentication tokens, software or mobile tokens in order to gain access. So users could be faced with the inconvenience of carrying a "token necklace" in order to access multiple online accounts securely. Furthermore, with the constantly changing and complex password models used to secure many online accounts the authorization process for a user is becoming more complicated and inconvenient. How can application owners solve this issue?

Read more of this white paper to find out how federated identity management can solve the password complexity and the "token necklace" problem while keeping up with increasing security requirements. This paper will illustrate the opportunity for an improved authentication model in order to

� extend the value to customers

� recoup costs to the application provider

� generate revenue opportunities for tomorrow and

� differentiate your business

Whitepaper: Digipass Authentication for the Check Point FireWall-1 NG

by VASCO Data SecurityJan 01, 2008

This white paper published by vasco confers the different steps that one can enforce strong user authentication on Check Point FireWall-1 by using Vacman Middleware product with the Digipass tokens. After outlining the prerequisites, this white paper guides through the process of installing Vacman Middleware, configuring VACMAN Middleware, configuring the Check Point FireWall-1 for Radius authentication and testing different configurations to enforce strong user authentication.