IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication White Papers (View All Report Types)
 
20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: This white paper shows you how to properly manage privileged accounts and offers a credential vault, audit capabilities and a suite of solutions for control of administrator access across your enterprise.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

Get Ahead of Our Next Security Breach
sponsored by Dell Software
WHITE PAPER: This white paper outlines five concrete steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement