IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization and Accounting Multimedia (View All Report Types) University: Why SSL Certificate Security Matters
sponsored by
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

Next-Gen Autentication
sponsored by
VIRTUAL ENVIRONMENT: This Security classroom explores the latest in authentication methods and technologies.
Posted: 23 Sep 2016 | Premiered: 15 Sep 2016

Benefits & Regulatory Requirements of Electronic Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, examine the technology and personnel requirements necessary to enable Electronic Prescription of Controlled Substances (ECPS).
Posted: 08 Jun 2015 | Premiered: Dec 3, 2014


Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012


Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013


Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011


CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012


Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011


Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006


HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement