IT Management  >   Systems Operations  >   Security  >   AAA  >  

3 Factor Authentication

RSS Feed    Add to Google    Add to My Yahoo!
3 Factor AuthenticationReports
 
Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

Twelve Recommendations For Your Security Program In 2014
sponsored by TITUS
WHITE PAPER: This Forrester Research, Inc. report highlights how the IT environment requires a more customer-oriented business, and 4 ways that IT security teams are now responsible for driving this initiative. Click now for 12 security strategy best practices designed to last.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

TITUS

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Why Passwords Aren't Strong Enough
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, uncover the urgent need for strong authentication, and how investing in one-time password technology will not only keep your assets protect, but also deliver high ROI in the long-run.
Posted: 18 Nov 2013 | Published: 31 Jan 2011

RSA, The Security Division of EMC

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Best Practices for Managing and Understanding Mobile Authentication
sponsored by OpenTrust
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

OpenTrust

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE: SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement