Tags: Authentication

Deep Secure Web Guard

This product controls web traffic entering and leaving the organisation, defending against advanced attacks and misuse. It is increasingly used by organisations that need to tightly control Internet browsing traffic or need to use web protocols to transfe ...

Category Guards Web
VendorDeep Secure
Pricing ModelCommercial
Modified

TypeWATCH is an eBiometrics solution that needs no hardware, yet continuously monitors for identity data theft attempts, by analyzing free text typing patterns of each user. It provides continuous security post-login (inside the perimeter) and secures th ...

VendorWatchful Software
Pricing ModelCommercial
Modified

RightsWATCH delivers the data-centric solution for information protection, ensuring that information is kept protected no matter who has access to the network and systems. Protection is enforced on the files/data itself, instead of only on the system or n ...

Category DLP Network
VendorWatchful Software
Pricing ModelCommercial
Modified
Stormpath User Management and Authentication

Stormpath is a User Management API that reduces development time with instant-on, scalable user infrastructure. Stormpath's intuitive API and expert support make it easy for developers to authenticate, manage and secure users and roles in any application. ...

VendorStormpath
Pricing ModelService
Modified

PixelPin is a B2B2C solution which replaces passwords with pictures. Users choose a picture and click on it in 4 places in sequence to sign in. Key benefits of PixelPin's picture password Simple, quick & easy to use across all platforms On mobile d ...

VendorPixelPin
Pricing ModelCommercial
Modified
RSA Adaptive Authentication

Adaptive Authentication monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling, and data feeds from RSA eFraudNetwork. AT A GLANCE Measures risk of login and post login activities by evaluating o ...

VendorRSA
Pricing ModelCommercial
Modified
RSA Access Management

RSA Access Management: Access-management software that enables seamless and secure access to information anywhere and anytime. With simplified access management, businesses can connect users to information simply, securely, and efficiently. Secure Access ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA SecurID Software Authenticator

RSA SecurID Software Authenticator protects mobile users within your organisation with security tokens for their smartphones, tablets and PCs. It uses software tokens to secure access from popular mobile platforms, including iOS (iPhone, iPad), Android, B ...

VendorEMC Corporation
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019