It can tie in directly with the existing LDAP or Active Directory infrastructure and provide both hardware and soft token authentication options. It also includes many automation and user self-service ...
🚀 Get Started with Our SafeNet RESTful Authentication Gateway on Docker Hub! 👉 Alternately, deploy this project directly using our JAR file! Check out the jar folder in our repository for ...
BALTIMORE - October 03, 2012 - SafeNet, Inc., the global leader in data protection, today announced the immediate availability of SafeNet Authentication Service, a new cloud-based authentication ...
🚀 Get Started with Our SafeNet RESTful Workflow API on Docker Hub! 👉 Alternately, deploy this project directly using our JAR file! Check out the jar folder in our repository for step-by-step ...
New Delhi: SafeNet, Inc. has announced that its SafeNet Authentication Service (SAS) can be fully integrated with Microsoft Windows Server 2012 R2 Active Directory Federation Services (AD FS). This ...
Dubai, United Arab Emirates - 25 TH January 2012-- SafeNet, Inc., a global leader in data protection,, today announced that the company has been positioned by Gartner, Inc. in the Leaders quadrant of ...
BALTIMORE July 14, 2011 SafeNet, Inc., a global leader in information security, announced today the immediate availability of its new mobile device credentialing solution that enables the secure use ...
High-Performance Toolkit Enables Secure Authentication for OEMs in VPN, 3G Networks, Storage Area Networks, Unlicensed Mobile Access and Wireless LAN Markets. BALTIMORE, Maryland, March 29, 2005 - ...
SafeNet has acquired Cryptocard, a privately held leader in cloud based authentication solutions. According to SafeNet officials, the Cryptocard platform will provide a unique opportunity for mobile ...
Virtustream, Inc., the enterprise class cloud software and Infrastructure as a Service (IaaS) provider, and SafeNet, Inc., a global information security service provider, have announced they have ...
This acquisition makes Gemalto the reference in cloud data, software and transaction security adding core network data protection technologies to its authentication offerings that protect the edge of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results