IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Administration (Security) White Papers (View All Report Types)
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

ECPS and HIPAA Compliance through Two-Factor Authentication
sponsored by VASCO Data Security International
WHITE PAPER: This white paper explores two factor authentication and how it protects users and sensitive data for web-based and mobile applications in healthcare organizations.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

VASCO Data Security International

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

When and Where Is the Public Willing to Provide Biometric Information?
sponsored by Unisys
WHITE PAPER: This infographic discusses how the public feels about using biometric security information, including when and where they think it is appropriate.
Posted: 28 Sep 2015 | Published: 28 Sep 2015


Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014


Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

3 Essential Components for a Strong End User Security Strategy
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.
Posted: 06 Oct 2015 | Published: 30 Nov 2014

Dell, Inc. and IntelĀ®

When Reputation is Not Enough: Spam Firewall Predictive Sender Profiling
sponsored by Barracuda Networks
WHITE PAPER: In this white paper, you'll uncover how to detect the uncharacteristic behavior of spam emails and blacklist the sender before the slew of spam hits your inbox.
Posted: 09 Sep 2015 | Published: 08 Jul 2015

Barracuda Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement