IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor AuthenticationReports
 
F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Figuring out FIDO
sponsored by HID
PODCAST: This expert podcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO Alliance.
Posted: 11 Aug 2014 | Premiered: Aug 6, 2014

HID

Enhanced Threat Detection: The Next (Front) Tier in Security
sponsored by IBM
EGUIDE: This expert e-guide explains how useful threat detection can be for your business and what its capabilities consist of.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Restore Balance With Authentication Technologies
sponsored by TechTarget
RESOURCE: Are you ready for the next era of authentication and authorization? Our expert guide, Restore Balance With Authentication Technologies, breaks down how next-gen tools tackle cloud and mobility-based vulnerabilities. By contributing to our brief survey, you'll gain access to this resource, enabling you to answer that question for yourself.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Cloud IAM catching on in the enterprise
sponsored by IBM
EGUIDE: This expert e-guide explains why the market for cloud-based IAM is growing.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

Co-operative Financial Services
sponsored by HID
CASE STUDY: Explore this case study to learn how a financial services organization in the UK implemented a solution to address identity and access issues.
Posted: 31 Jul 2014 | Published: 25 Mar 2013

HID

HID Global’s Identity Assurance SMB Solution
sponsored by HID
DATA SHEET: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement