IT Management  >   Systems Operations  >   Security  >   AAA  >  

2 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
2 Factor Authentication Reports
 
Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by SearchSecurity.com
EGUIDE: Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

SearchSecurity.com

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Going Wireless—The Key to Enhancing Patient Care
sponsored by Hewlett-Packard Limited
CASE STUDY: Access this case study to learn how one healthcare facility implemented a wireless network to help improve accessibility for electronic patient records.
Posted: 13 Mar 2015 | Published: 01 Dec 2014

Hewlett-Packard Limited

Identity and Access Management Buyer's Guide - 5th Edition
sponsored by SailPoint Technologies
WHITE PAPER: In this buyer's guide, learn the key factors to address when choosing an IAM solution.  Additionally, read on to learn the three starter access management strategy steps.
Posted: 18 Mar 2015 | Published: 14 Jan 2015

SailPoint Technologies

5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015

SecureAuth

SSL Certificate Management: Avoiding Common Mistakes
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
Posted: 15 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement