IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication Reports
Avoid Threats on Mobile Health Devices with Healthcare Security Best Practices
sponsored by CloudMine
EGUIDE: Explore expert analyses on how to protect mobile health data and devices in 4 steps. Continue reading to learn 7 best practices for bolstering your mHealth security strategy
Posted: 28 Oct 2015 | Published: 07 Oct 2015

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

In What Circumstances are Australians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Australia and uncovered the fact that most Aussies support the use of biometrics down under to verify identities when boarding aircraft, but don't support other instances such as having retailers employ biometrics to make customized offers. Read on to find out why.
Posted: 30 Sep 2015 | Published: 02 Sep 2015


Self-Service Password Management: Taking the Burden off IT
sponsored by Imprivata
WHITE PAPER: This white paper explores enabling self-service password management for users and enhancing authentication security.
Posted: 22 Sep 2015 | Published: 05 May 2015


Strategies for Web and API Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, you'll learn about next-gen identity standards and requirements and how to secure access to apps - regardless of their environment.
Posted: 27 Oct 2015 | Published: 14 Jul 2014

Ping Identity Corporation

Enabling Mobility without Compromising Security
sponsored by Dell Software
WHITE PAPER: This white paper examines the top 5 mobile security challenges and introduces a model that charts the benefits and risks of various mobile access approaches.
Posted: 29 May 2015 | Published: 20 May 2015

Dell Software

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014


Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement