IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access Codes Reports
 
Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013

HID

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Global Authentication in Online Financial Services Leadership Award
sponsored by HID
WHITE PAPER: This white paper outlines a 6-step strategy to strengthening authentication to close vulnerabilities and mitigate advanced threats. Continue reading to learn the criteria authentication needs today to secure enterprise data.
Posted: 14 Aug 2015 | Published: 30 Dec 2014

HID

IAM - The Foundation of Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.
Posted: 08 May 2015 | Published: 11 Dec 2014

Symantec Corporation

Strengthen Security with Intelligent Identity and Access Management
sponsored by IBM
WHITE PAPER: View this white paper to learn how to control user access to sensitive assets and monitor their actions after they gain access.
Posted: 02 Mar 2015 | Published: 09 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement