Tag: Logical Access

Identity on a Mobile Device: Access Control Use Cases

Identity on a Mobile Device: Access Control Use Cases The Secure Technology Alliance Identity Council hosted the second webinar in its series on mobile identity credential use cases on July 26th. Mobile identity credentialing can create a more secure and convenient experience for many applications for both consumers and businesses. The webinar explores the uses…

Alliance Activities : Events : Webinar : Identity on a Mobile Device

Identity on a Mobile Device Establishing and using identity on a mobile device can enable stronger authentication and digital signature capabilities for use in applications such as digital driver’s licenses, banking, retail and access control. The Secure Technology Alliance Identity Council “Identity on a Mobile Device” webinar series explores a wide range of use cases for…

How to Plan, Procure and Deploy a PIV-Enabled Physical Access Control System

How to Plan, Procure and Deploy a PIV-Enabled Physical Access Control System The Secure Technology Alliance Access Control Council held a six-part webinar series on how to plan, procure and implement PIV1-enabled physical access control systems (PACS) for government facilities. The series was created for systems engineers, facility managers, physical security personnel, and other government…

Alliance Activities : Publications : Smart Card Alliance Commentary: OMB Circular A-130 – Managing Information as a Strategic Resource

Smart Card Alliance Commentary: OMB Circular A-130 – Managing Information as a Strategic Resource Publication Date: September 2016 Download the position paper Circular A-130, “Managing Information as a Strategic Resource,” published by the Office of Management and Budget (OMB), sets policy and establishes guidance for management of Federal information resources. As OMB is within the…
InPublications

Alliance Activities : Publications : Card-Not-Present Fraud: A Primer on Trends and Transaction Authentication Processes

Card-Not-Present Fraud: A Primer on Trends and Transaction Authentication Processes Publication Date: February 2014 Click here to download the white paper. As the U.S. moves to EMV chip technology to significantly curb counterfeit card fraud at the retail point of sale (POS), criminals may turn their attention to committing card-not-present (CNP) fraud via online or…