IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Network AuthenticationWhite Papers (View All Report Types)
 
Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

Identify And Influence Identity Stakeholders
sponsored by Ping Identity Corporation
WHITE PAPER: This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change.
Posted: 20 May 2013 | Published: 16 Jul 2012

Ping Identity Corporation

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Securing your Online Data Transfer with SSL
sponsored by Thawte Inc.
WHITE PAPER: This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Thawte Inc.

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement