IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor Authentication Reports
 
Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Challenges and Benefits of Making a Business Case for IAM
sponsored by Nexmo
EGUIDE: This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nexmo

Critical Factors to Endpoint Security
sponsored by Dell, Inc. & IntelĀ®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. & IntelĀ®

Solidifying Cloud Security
sponsored by Ping Identity Corporation
VIDEO: This video will show you how Ping Identity's partner Fishnet Security enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency.
Posted: 03 Feb 2015 | Premiered: 21 Jan 2013

Ping Identity Corporation

Virtualized Desktops in Healthcare
sponsored by Imprivata
WHITE PAPER: Ensure a successful virtual desktop infrastructure (VDI) deployment by learning how to overcome the most common barriers, such as clinical adoption, high overhead costs, and meeting new authentication needs.
Posted: 09 Apr 2015 | Published: 20 Nov 2014

Imprivata

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014

IBM

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement