IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization, and Accounting White Papers (View All Report Types)
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

The Anatomy of a Data Breach
sponsored by SailPoint Technologies
WHITE PAPER: 43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Get Ahead of Your Next Security Breach
sponsored by One Identity
WHITE PAPER: Uncover five steps you can take to protect your organization from the inherent risks of privileged accounts, preventing their malicious use by hackers and insider threats.
Posted: 05 May 2016 | Published: 31 Dec 2015

One Identity

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

The 7 Challenges to Online Identity Verification
sponsored by Evident
WHITE PAPER: Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Evident

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement