IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization and AccountingWhite Papers (View All Report Types)
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Balance Work and Personal Use on Mobile Devices Securely
sponsored by IBM
WHITE PAPER: This resource highlights a cross-platform solution that strives towards data loss prevention with a consistent workflow.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

IBM

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

One campus card for Educational Institutions
sponsored by HID
WHITE PAPER: Click through to this white paper to discover the advantages of implementing a single campus card, including various security benefits to protect college campuses.
Posted: 05 Aug 2014 | Published: 12 Jun 2014

HID

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Strategies for Enhancing the Clinician’s Workstation Productivity
sponsored by Siemens
WHITE PAPER: Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Siemens
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement