IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  


RSS Feed    Add to Google    Add to My Yahoo!
ACLs Reports
Why Online Trust is at the Breaking Point
sponsored by Venafi
WHITE PAPER: This infographic breaks down the danger that cryptographic keys and digital certificates are in, giving you essential statistics on the threats they pose to your organization.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Embracing Secure BYOD
sponsored by Acronis
WHITE PAPER: Access this white paper to learn the 7 key features to look for when evaluating a comprehensive access, sync and share solution as you empower your mobile employees.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Single Sign-On Buyer's Evaluation Handbook
sponsored by Imprivata
WHITE PAPER: When you begin your search for a SSO strategy, refer to this helpful evaluation white paper. View now to see what questions you need to ask when choosing a SSO platform and what features you need to have.
Posted: 24 Sep 2015 | Published: 20 May 2015


Enhanced Access Control for the Healthcare Industry
sponsored by Imprivata
WHITE PAPER: This report takes a look at security designed for healthcare, discussing what single sign-on, virtual desktop access and more looks like when it complies with healthcare needs.
Posted: 25 Sep 2015 | Published: 31 Mar 2015


Next-Gen Identity: Secure App Access
sponsored by Ping Identity Corporation
WEBCAST: Learn how to control user access to systems and apps to avoid identity theft nightmares in this brief webcast.
Posted: 27 Oct 2015 | Premiered: Aug 14, 2015

Ping Identity Corporation

7 Cloud Security Risks That Will Ruin Your Day
sponsored by Intel and IBM
EGUIDE: This expert e-Guide presents today's top 7 cloud security risks that challenge organizations.
Posted: 29 Sep 2015 | Published: 09 Sep 2015

Intel and IBM

How Attackers Use Stolen Keys and Certificates
sponsored by Venafi
WHITE PAPER: This white paper breaks down the process hackers use when compromising your keys and certificates and discusses what you can do to stop them.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement