IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization, and Accounting Multimedia (View All Report Types)
 
Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: Learn about HDAP, a big data LDAP directory, which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than traditional LDAP directories.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Kevin Beaver offers guidance on capabilities you may want to have when addressing vulnerabilities, for example support for authenticated vulnerability scans. He also looks at the current state of capabilities for remediation.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014

SearchSecurity.com

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement