Software  >   Systems Software  >   Security Software  >  

ID Management

RSS Feed    Add to Google    Add to My Yahoo!
ID Management White Papers (View All Report Types)
 
eBook: CIOs Guide to Modern Identity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

Multi-Step Authentication and Why You Should Use It
sponsored by Global Knowledge
WHITE PAPER: Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
Posted: 05 Sep 2013 | Published: 08 Aug 2013

Global Knowledge

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

Identity Management: The Foundation for PCI, SOX, and HIPAA Compliance
sponsored by Watson SCS, Inc.
WHITE PAPER: This paper discusses the inner-workings of an identity management solution and how it relates to SOX, PCI and HIPAA compliance.
Posted: 01 Dec 2007 | Published: 01 Nov 2007

Watson SCS, Inc.

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure.
Posted: 08 Feb 2010 | Published: 12 Sep 2008

Hewlett-Packard Company

Entrust IdentityGuard for Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: As an established global leader in layered security strategies, Entrust offers a cost-effective versatile authentication platform that can help organizations protect the identities of employees and partners accessing sensitive enterprise data.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement