IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor Authentication Reports
Next-Gen Identity: Secure App Access
sponsored by Ping Identity Corporation
WEBCAST: Learn how to control user access to systems and apps to avoid identity theft nightmares in this brief webcast.
Posted: 27 Oct 2015 | Premiered: Aug 14, 2015

Ping Identity Corporation

In What Circumstances are Australians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Australia and uncovered the fact that most Aussies support the use of biometrics down under to verify identities when boarding aircraft, but don't support other instances such as having retailers employ biometrics to make customized offers. Read on to find out why.
Posted: 30 Sep 2015 | Published: 02 Sep 2015


The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

Authenticating taxicab services
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

Improving Hybrid Cloud Security: Take a Closer Look
sponsored by Intel and IBM
WHITE PAPER: In this technical white paper, take a look under the hood at one hybrid cloud platform to see the security measures built in to protect data.
Posted: 09 Sep 2015 | Published: 17 Sep 2014

Intel and IBM

IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Security Strategies for Today's Data Warehouses
sponsored by IBM
WHITE PAPER: This white paper discusses the necessity of an end-to-end security strategy for data warehouses and gives tips for building that kind of strategy.
Posted: 22 Apr 2015 | Published: 17 Jul 2013


Managing the Insider Threat with Active Directory Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the dangers malicious actors pose to Active Directory and gives suggestions for AD security best practices.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Dell, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement