IT Management  >   Systems Operations  >   Security  >  

Access Authentication and Authorization

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication and Authorization White Papers (View All Report Types)
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Enhacing IAM and Authentication with Threat Intelligence
sponsored by SecureAuth
WHITE PAPER: What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.
Posted: 18 Jan 2016 | Published: 17 Nov 2015

SecureAuth

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.

Speed Up Your Business with E-Signatures
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement