IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed    Add to Google    Add to My Yahoo!
User Authentication White Papers (View All Report Types)
 
The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Evident

Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Market Pulse Survey
sponsored by SailPoint Technologies
WHITE PAPER: According to SailPoint Technologies' Market Pulse Survey, 3 in 5 respondents admitted they expect to be breached this year, but only 1/3 of them believe they won't even know when it happens. This resource explores how enterprises are changing their approach to security, amid the evolving threat landscape of the largest breaches ever recorded.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

SailPoint Technologies

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

How to Achieve End-to-End Authentication
sponsored by iovation, Inc.
WHITE PAPER: Examine how to overcome top authentication challenges by adapting to different levels of risk in real time. Uncover how you can use this method to respond to different risk scenarios.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID Global
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID Global

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement