IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Access Authentication Reports
 
Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Choosing an IAM Architecture for Improved Business Processes
sponsored by Dashlane Inc.
EGUIDE: This white paper presents the features and capabilities an IAM architecture needs to have to improve business processes and simplify onboarding. Read on to learn how to determine if a provider-centric or user-centric model is the best for your organization.
Posted: 03 Dec 2015 | Published: 30 Nov 2015

Dashlane Inc.

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Using Identity to Create Next Generation, Risk-based Access Management
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.
Posted: 20 Jan 2016 | Published: 31 Aug 2015

SecureAuth

Context-Aware, Dynamic Access Control
sponsored by Cryptzone
RESOURCE: This brief resource outlines how security pros need to take a dynamic approach to secure network access. Read on to learn about a new platform that considers both context and identity to grant access to your network, and see if it's right for your business.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

Cryptzone

Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop
sponsored by Hortonworks
WHITE PAPER: In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.
Posted: 12 Feb 2016 | Published: 31 Oct 2015

Hortonworks

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Case Study: Secure Employee Remote Access through Strong Authentication
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secure employee remote access.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement