IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management White Papers (View All Report Types)
 
Five Services to Grow Your Business
sponsored by ConnectWise
WHITE PAPER: What's your growth and client retention strategy? Technology providers need to be on the breaking edge of technology trends and consumer demands.  The last thing you want is to lose a client because you don't offer a certain service.  So what services are clients asking for in 2013?  Download this eBook to keep you ahead of the curve.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

ConnectWise

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

eBook: CIOs Guide to Modern Identity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

Leveraging Privileged Identity Governance to Improve Security Posture
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource takes an in-depth look at insider attacks, and discusses how privileged identity governance can help you identify and deal with potential threats from within your own environment.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.

Multi-Step Authentication and Why You Should Use It
sponsored by Global Knowledge
WHITE PAPER: Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
Posted: 05 Sep 2013 | Published: 08 Aug 2013

Global Knowledge

Intelligent Authentication and User Access: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This informative white paper outlines today's rapidly changing security landscape,  and offers an overview of the latest identity and access security strategies so that your organization can stay safe - click through to learn more.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

CA Technologies.

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement