IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Access AuthenticationMultimedia (View All Report Types)
 
Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014

SearchSecurity.com

Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST: This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

A Case for Pager Replacement Presented by Dr. Larry Ponemon
sponsored by Imprivata
WEBCAST: Discover how communication inefficiencies can severely impact the healthcare industry, and how implementing a new, mobile communication technique can result in cost savings over time.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Imprivata

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST: This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)

Symantec Corporation

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST: Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement