IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access Codes White Papers (View All Report Types)
 
How to Integrate Siloed Identities and Data
sponsored by Radiant Logic, Inc.
WHITE PAPER: This comprehensive white paper digs into the current fragmented landscape of identity infrastructures. Read on for expert tips on integrating identities and data out of silos.
Posted: 14 Dec 2015 | Published: 31 Dec 2012

Radiant Logic, Inc.

Configuration Management: Puppet or Chef?
sponsored by FoxT
WHITE PAPER: This white paper pits Puppet against Chef and brings the shortcomings of each to light to help your organization decide which strategy is right for your IAM needs.
Posted: 22 Dec 2015 | Published: 04 Dec 2015

FoxT

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Defending Against Advanced Threats at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This white paper explores how identity has become the new perimeter and the challenges that lie ahead.
Posted: 17 Jun 2015 | Published: 27 May 2015

SecureAuth

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Research Report: Enabling the Full Potential of New Operating Systems
sponsored by Microsoft
WHITE PAPER: This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.
Posted: 01 Feb 2016 | Published: 30 Oct 2015

Microsoft

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Strategies for Enhancing the Clinician’s Workstation Productivity
sponsored by Siemens
WHITE PAPER: Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Siemens

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement