IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor Authentication White Papers (View All Report Types)
 
Virtualized Desktops in Healthcare
sponsored by Imprivata
WHITE PAPER: Ensure a successful virtual desktop infrastructure (VDI) deployment by learning how to overcome the most common barriers, such as clinical adoption, high overhead costs, and meeting new authentication needs.
Posted: 09 Apr 2015 | Published: 20 Nov 2014

Imprivata

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Grow Business Consumer Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Posted: 12 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett-Packard Company
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett-Packard Company

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

Speed Up Your Business with E-Signatures
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement