Standards  >   Network Protocols  >   Network Authentication Protocols  >  

PAP

RSS Feed    Add to Google    Add to My Yahoo!
PAP White Papers (View All Report Types)
 
Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Identity Simplification and Consolidation through Virtualization and Synchronization
sponsored by Agilysys-Sun Technology Solutions
WHITE PAPER: You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Agilysys-Sun Technology Solutions

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

The New Encryption Generation: Closing the Gap
sponsored by CREDANT Technologies
WHITE PAPER: This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

CREDANT Technologies

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning
sponsored by Security Weaver
WHITE PAPER: For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

Security Weaver

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PAP White Papers | PAP Multimedia | PAP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement