IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed    Add to Google    Add to My Yahoo!
Authorization Codes White Papers (View All Report Types)
 
Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

Revitalize and Extend the Reach of Your Current ISAM Portal
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.
Posted: 31 Mar 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Protecting your Customers’ Online Banking Transactions
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement