Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
REDWOOD SHORES, CA -- (Marketwired) -- 04/10/14 -- Oracle (NYSE: ORCL)
News Summary
As digital security risk continues to grow, the need for organizations to authenticate user identities using 2-factor strong authentication, before providing employees and customers access to sensitive information, is crucial. However, the cost of providing secure authentication methods beyond a password have historically been prohibitive, and most users have bristled at the idea of carrying around a token or card to validate their identity. To address these challenges, Oracle is introducing Oracle Mobile Authenticator, a new component of Oracle Access Management Suite. With this solution, an employee's or consumer's personal phone or tablet can be turned into a second factor authentication device, eliminating the complexity associated with supplying, maintaining and revalidating security devices such as tokens or smart cards. This provides a more cost effective approach to securing consumer access for companies looking to secure their customers and employees from fraud.
News Facts
Comprehensive and Integrated Security for Today's Mobile Enterprise
Supporting Quote
Supporting Resources
About Oracle
Oracle engineers hardware and software to work together in the cloud and in your data center. For more information about Oracle (NYSE: ORCL), visit www.oracle.com.
Trademarks
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Contact Info
Teri Whitaker
Oracle
+1.650.506.9914
Email Contact
Drew Smith
Blanc & Otus
+1.415.856.5127
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs