IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Password Management

RSS Feed    Add to Google    Add to My Yahoo!
Password ManagementWhite Papers (View All Report Types)
1 - 25 of 80 Matches Previous Page  | Next Page
SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Integrating Microsoft Technologies with an Identity and Access Management Solution
sponsored by OpenIAM
WHITE PAPER: In this whitepaper, learn how one comprehensive identity and access management (IAM) solution can be easily integrated with your existing Microsoft technologies, as well as non-Microsoft tools.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

OpenIAM

Why Passwords Aren't Strong Enough
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, uncover the urgent need for strong authentication, and how investing in one-time password technology will not only keep your assets protect, but also deliver high ROI in the long-run.
Posted: 18 Nov 2013 | Published: 31 Jan 2011

RSA, The Security Division of EMC

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do!
sponsored by Global Knowledge
WHITE PAPER: Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Multi-Step Authentication and Why You Should Use It
sponsored by Global Knowledge
WHITE PAPER: Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
Posted: 05 Sep 2013 | Published: 08 Aug 2013

Global Knowledge

The Essentials of OAuth: Key to BYOD
sponsored by Ping Identity Corporation
WHITE PAPER: Discover how you can create a consistent, flexible identity and policy architecture for web apps, web services, devices, and clients communicating with cloud APIs.
Posted: 13 May 2013 | Published: 28 Feb 2013

Ping Identity Corporation

Protect Your IT Systems with Next Generation Security
sponsored by IBM
WHITE PAPER: This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.
Posted: 16 Apr 2013 | Published: 31 Oct 2012

IBM

Password Change Service - Avaya CallPilot
sponsored by Global Knowledge
WHITE PAPER: Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator how to set up and utilize Password Reset Service, introduced with CallPilot Release 5.
Posted: 29 Mar 2013 | Published: 20 Mar 2013

Global Knowledge

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: In an increasingly cloud-based IT universe, concerns are being raised and addressed regarding the security of privileged and shared accounts. See this white paper for more information on the latest in cloud-based security for privileged identities.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

IBM

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing
sponsored by Ping Identity Corporation
WHITE PAPER: In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing.
Posted: 27 Feb 2013 | Published: 31 Aug 2012

Ping Identity Corporation

Controlling and Managing Superuser Access
sponsored by Dell Software
WHITE PAPER: "Super users" – those people with greater access and rights – is a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Discover the risks associated with privileged accounts and how to mitigate them. Read "Controlling and Managing Super User Access"
Posted: 19 Dec 2012 | Published: 31 Dec 2011

Dell Software

Controlling laptop and smartphone access to corporate networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

User Provisioning: The Business Imperative
sponsored by CA Technologies.
WHITE PAPER: Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!
Posted: 15 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Hot Tips for Securing Your Wireless Network
sponsored by Sophos, Inc.
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos, Inc.

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified
1 - 25 of 80 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement