Skip to main content
19 Results

Trusted Identities Guide

By leveraging smartphones and other mobile devices as part of a more robust authentication scheme, organizations can feel more confident that they are blocking physical and digital access to their inf...

White Papers

store invoice icon

Instant Payoff Instant Issuance White Paper

Learn fresh ideas to drive growth in a rapidly changing competitive environment with instant financial issuance.

White Papers

store invoice icon
| Feb 06, 2021

Passwordless - Touchless Authentication White Paper

It’s time to move beyond passwords. Knowing the basics of high-assurance authentication and a true touchless solution will help you make the right choice.

White Papers

store invoice icon
| Jan 04, 2021

The Quantum Computer and Public-Key Crypto Systems

A look at security of the present-day public-key primitive, as well as implications for the future

White Papers

store invoice icon
| Jan 27, 2021

From Paper to the Cloud

This white paper walks through the basics of electronic and digital signatures as well as the latest related technologies and concepts – including remote signing.

White Papers

store invoice icon
| Dec 01, 2022

A Seamless Experience for the Mobile Desktop

Frictionless Access Authentication

White Papers

store invoice icon

TLS 1.3 and TLS 1.2 Comparison

In 2018 the Internet Engineering Task Force (IETF) published TLS 1.3 as RFC 8446. This protocol officially became a new standard alongside the existing standard – TLS 1.2. Download this guide for a fu...

White Papers

store invoice icon
| Jan 09, 2019

WHAT DO YOU MEAN I NEED AN SSL/TLS CERTIFICATE!

A Guide to SSL/Certificates and Their Use Cases

White Papers

store invoice icon
| Feb 21, 2019

The Importance of CJIs Compliance

The Importance of CJIs Compliance for Law Enforcement and Criminal Justice

White Papers

store invoice icon

Empowering eGovernment with Mobile Identity

Empowering eGovernment with Mobile Identity

White Papers

store invoice icon