IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access Control White Papers (View All Report Types)
 
Making Big Data Accessible, Actionable and Affordable
sponsored by Kofax, Inc.
WHITE PAPER: Read this white paper for use cases of real-world customers who are reaping benefits from big data that was once almost impossible to access. Learn how your organization can also harness this data from internal and external sources and put it in the hands of business users rapidly and cost-effectively.
Posted: 06 May 2015 | Published: 31 Oct 2013

Kofax, Inc.

Hybrid Environments Demand Coordinated IAM For Both Security And Agility
sponsored by Microsoft
WHITE PAPER: View this informative report issued by Forrester that explains the IAM challenges firms are facing with hybrid cloud architecture, how these are being addressed currently, and the projected evolution of these management techniques in response to continued and accelerated cloud adoption.
Posted: 06 May 2015 | Published: 01 May 2014

Microsoft

Identity and Access Management Buyer's Guide - 5th Edition
sponsored by SailPoint Technologies
WHITE PAPER: In this buyer's guide, learn the key factors to address when choosing an IAM solution.  Additionally, read on to learn the three starter access management strategy steps.
Posted: 18 Mar 2015 | Published: 14 Jan 2015

SailPoint Technologies

Simplify, Unify Access with a Converged Campus Network
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores how converging wired and wireless access layers can help you gain the ability to meet the exploding demand for connectivity in a way that is not only sustainable, secure, and manageable, but can also deliver a better user experience.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Managing Identity as the New Perimeter
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement