IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Management of Identity

RSS Feed    Add to Google    Add to My Yahoo!
Management of Identity White Papers (View All Report Types)
Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013


Security Strategies for Today's Data Warehouses
sponsored by IBM
WHITE PAPER: This white paper discusses the necessity of an end-to-end security strategy for data warehouses and gives tips for building that kind of strategy.
Posted: 22 Apr 2015 | Published: 17 Jul 2013


Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014


4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to developing a proactive data security and privacy approach that will help you keep big data safe without hindering your ability to capitalize on that data.
Posted: 21 Apr 2015 | Published: 18 Jun 2014


Secure, Single-tap Access to NFC Mobile Devices
sponsored by HID
WHITE PAPER: In this brief infographic, discover how to secure mobile devices using NFC and mitigate mobile threats. View now to learn how to improve UX without sacrificing data protection.
Posted: 08 Oct 2015 | Published: 31 Aug 2015


Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014


Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011


Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement