IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication White Papers (View All Report Types)
 
5 Reasons Why Mobile Will Transform Enterprise Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Entrust, Inc.

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.

Securing Your Private Keys as Best Practice for Code Signing Certificates
sponsored by Thawte Inc.
WHITE PAPER: This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement