IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  


RSS Feed    Add to Google    Add to My Yahoo!
IAM White Papers (View All Report Types)
How Cryptographic Keys Enabled Hackers to Undermine Security
sponsored by Venafi
WHITE PAPER: This infographic breaks down a trust-based attack, showing how hackers compromised vulnerable encryption keys and why security controls didn't stop them.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014


Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

How to Centralize Strong Authentication Management
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll uncover how to enforce secure and compliant access to networks and apps, both local and remote.
Posted: 23 Sep 2015 | Published: 13 May 2015


Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

A Buyer’s Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: Access this white paper to learn how a new generation of information rights management (IRM) solutions is eliminating complexity and cost concerns to provide persistent protection for your valuable company data.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

IntraLinks, Inc

Stopping Cybercrime: A Guide for the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper contains a list of best practices financial institutions can follow to ensure that they remain secure in the face of growing cyber-attacks.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

LogRhythm, Inc.

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement