IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed    Add to Google    Add to My Yahoo!
IAM White Papers (View All Report Types)
 
Cloud Sherpas Collaboration Assessment
sponsored by Cloud Sherpas
WHITE PAPER: This white paper explains how Collaboration Assessment can prioritize your initiatives and define specific solutions. Read now to eliminate uncertainty and maximize the value you get from Google's collaboration capabilities.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Cloud Sherpas

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Enabling Your Mobile Workforce with Secure Mobile Content Collaboration
sponsored by Box
WHITE PAPER: This white paper explores the leading mobile security strategies in use today to secure the enterprise network.
Posted: 26 Jun 2015 | Published: 17 Jun 2015

Box

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 02 Jun 2015 | Published: 08 May 2015

HID

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Evaluating File Sync and Share Solutions
sponsored by Dropbox for Business
WHITE PAPER: This resource offers a 12-question checklist to go through when evaluating file sync and share vendors.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement