IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access Codes Reports
 
How to Protect Critical Data while Maintaining Ease of Use
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper explores how you can strike a balance between security and convenience.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault

Helpful Hints for Identity and Access Management
sponsored by SailPoint Technologies
EGUIDE: This expert e-guide walks you through the 15 IAM challenges of today and how to craft a strategy to overcome or avoid them. View now to learn more.
Posted: 06 Apr 2015 | Published: 18 Mar 2015

SailPoint Technologies

IAM: The New Security Perimeter
sponsored by IBM
WHITE PAPER: Access this white paper to explore how IAM platforms reduce risk and keep unknown users and hackers out of your network.
Posted: 25 Mar 2015 | Published: 05 Nov 2013

IBM

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

Securing Access to the Office 365 Cloud with Two Factor Authentication
sponsored by Data#3
WHITE PAPER: Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
Posted: 29 Oct 2013 | Published: 01 Feb 2012

Data#3

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement