IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access Control White Papers (View All Report Types)
In What Circumstances are Australians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Australia and uncovered the fact that most Aussies support the use of biometrics down under to verify identities when boarding aircraft, but don't support other instances such as having retailers employ biometrics to make customized offers. Read on to find out why.
Posted: 30 Sep 2015 | Published: 02 Sep 2015


IAM for Web Resources and APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you how to harness open standards like SAML to enable secure web SSO, protect APIs, and provide dynamic session management to employees.
Posted: 28 Oct 2015 | Published: 17 Jun 2015

Ping Identity Corporation

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014


FAQs: Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID
WHITE PAPER: This white paper addresses the mobile security FAQs to help banking organizations evaluate current strategy options. View now to learn the 4 goals banks need to accomplish and how to make customers feel secure when using online banking offerings.
Posted: 20 Nov 2015 | Published: 11 Nov 2015


Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Key Considerations for Choosing Your Strong Authentication Strategy
sponsored by Imprivata
WHITE PAPER: This white paper presents the 7 forms of strong authentication and explores the benefits of each one. Continue reading to learn more about the factors to consider when choosing strong authentication and how to take your IAM strategy to the next level.
Posted: 24 Sep 2015 | Published: 28 May 2015


Simplify Network Management to Control WAN Traffic and Protect SLAs
sponsored by Exinda Networks
WHITE PAPER: In this white paper, you will discover how to strategically add a layer of intelligence to your network to boost performance. Learn how to orchestrate WAN bandwidth to configure all your applications, devices, users, locations, and activities from one management dashboard.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Exinda Networks

Single Sign-On Solutions for Employees to Microsoft Office 365
sponsored by Ping Identity Corporation
WHITE PAPER: Discover how to avoid deployment complexities and multiple logins and gain effortless access to Office 365 and other applications.
Posted: 26 Oct 2015 | Published: 13 Nov 2014

Ping Identity Corporation

Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement