IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Password Management

RSS Feed    Add to Google    Add to My Yahoo!
Password ManagementWhite Papers (View All Report Types)
26 - 50 of 79 Matches Previous Page  | Next Page
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Enterprise Single Sign On
sponsored by tools4ever
WHITE PAPER: With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
Posted: 18 May 2012 | Published: 17 May 2012

tools4ever

Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication
sponsored by RSA
WHITE PAPER: With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

RSA

Picking a Sensible Mobile Password Policy
sponsored by Perimeter eSecurity
WHITE PAPER: This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
sponsored by Intel
WHITE PAPER: In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Intel

Unified and Intelligent Identity and Access Management
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 08 Jul 2011 | Published: 08 Jul 2011

Dell Software

 Password Self Help – Password Reset for IBM i
sponsored by Safestone Technologies
WHITE PAPER: Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Safestone Technologies

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
WHITE PAPER: The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password.
Posted: 14 Feb 2011 | Published: 11 Feb 2011

Dell Software

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata

Symantec 2010 SMB Information Protection Survey
sponsored by Symantec Corporation
WHITE PAPER: Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.
Posted: 29 Nov 2010 | Published: 29 Nov 2010

Symantec Corporation

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

An Overview and Competitive Analysis of the One-Time Password (OTP) Market
sponsored by RSA
WHITE PAPER: The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

RSA

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

Password Management Best Practices
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.

Password Management Project Roadmap
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Improving Identity and Access Management in an SAP Environment
sponsored by Dell Software
WHITE PAPER: In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
Posted: 06 May 2010 | Published: 06 May 2010

Dell Software

Ten Ways to Dodge CyberBullets
sponsored by ESET
WHITE PAPER: This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

ESET

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation

The Total Economic Impact of CA Identity Manager
sponsored by CA Technologies.
WHITE PAPER: In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found.
Posted: 02 Mar 2010 | Published: 19 Feb 2010

CA Technologies.
26 - 50 of 79 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement