IT Management  >   Systems Operations  >   Security  >  

3A

RSS Feed    Add to Google    Add to My Yahoo!
3A Reports
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

The Anatomy of a Data Breach
sponsored by SailPoint Technologies
WHITE PAPER: 43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Aruba Clearpass Network Access Control
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how mobility and IoT are changing how organizations approach network access control (NAC) and how switching to security tools like Aruba Clearpass can help detect threats before damage occurs.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

The 7 Challenges to Online Identity Verification
sponsored by Evident
WHITE PAPER: Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Evident

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

Matching Your Authentication to the Speed of Your Business
sponsored by MicroFocus
WHITE PAPER: This white paper outlines the reality of today's IT environments and the authentication risks associated with them, and explores some tips as to how you can balance the priorities of your business owners and those of central IT to keep your organization productive and safe.
Posted: 15 Nov 2017 | Published: 29 Sep 2017

MicroFocus

Moving Past the Password? Not So Fast
sponsored by SearchSecurity.com
EBOOK: The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
3A White Papers | 3A Multimedia | 3A IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement