IT Management  >   Systems Operations  >   Security  >  

Access Authentication and Authorization

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication and Authorization Reports
Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Pros and Cons of Identity and Access Management as a Service
sponsored by Okta
WHITE PAPER: This white paper ranks IDaaS platforms and reveals the strengths and weaknesses of each. Explore now to learn more about IAMaaS and how to choose the ideal strategy.
Posted: 09 Sep 2015 | Published: 04 Jun 2015


Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

In What Circumstances are Australians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Australia and uncovered the fact that most Aussies support the use of biometrics down under to verify identities when boarding aircraft, but don't support other instances such as having retailers employ biometrics to make customized offers. Read on to find out why.
Posted: 30 Sep 2015 | Published: 02 Sep 2015


United Authentication and Identity Governance Management
sponsored by RSA
WHITE PAPER: In this white paper, you'll learn why your organizations cannot have segmented authentication, provisioning, and governance. Continue reading to learn how to unite these disparate processes in order to maintain regulatory compliance, ensure user verification, manage policies across diverse platforms, and more.
Posted: 25 Sep 2015 | Published: 19 Jan 2015


Information Security Magazine: August Issue
sponsored by
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement