We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Back to Insights

Data Security, Breach Detection Top Considerations for Choosing Authentication Methods

December 12, 2017 | Key Technologies

When businesses choose which types of authentication methods to use for their systems and applications, the top two considerations are securing company data and information, and the ability to detect attempted breaches. Another 32 percent said meeting or exceeding regulatory requirements was a consideration when choosing which authentication methods to use for customers and internal users.


IANS

— CLIENT PORTAL —

 SUBSCRIPTION REQUIRED
Please Login to continue



Related Research

12/10/2018 | Content Aggregator
Blockchain: Overview of Adoption Concerns


11/28/2018 | Content Aggregator
59% of Organizations Say Artificial Intelligence Reduces Application Security Risk


11/5/2018 | Content Aggregator
Artificial Intelligence: How It Supports Cybersecurity


11/1/2018 | Content Aggregator
Artificial Intelligence: Top Governance Challenges to Deployment