IT Management  >   Systems Operations  >   Security  >   AAA  >  

Password Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Password Authentication White Papers (View All Report Types)
 
Protecting your Customers’ Online Banking Transactions
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Password Hacking: Are You Safer in the Cloud?
sponsored by Dashlane Inc.
WHITE PAPER: This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.
Posted: 15 Dec 2015 | Published: 08 Dec 2015

Dashlane Inc.

Strategies for Web and API Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, you'll learn about next-gen identity standards and requirements and how to secure access to apps - regardless of their environment.
Posted: 27 Oct 2015 | Published: 14 Jul 2014

Ping Identity Corporation

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

IAM Buyers Guide: How to Evaluate and Choose the Right Platform
sponsored by IBM
WHITE PAPER: Access this resource and explore the IAM buyer's guide.  Discover how to evaluate and choose a solution to protect your organization's data
Posted: 25 Feb 2015 | Published: 11 Jun 2014

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement