IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access CodesReports
 
Single Sign On and Web Access Control Made Easy
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a unified, integrated identity and access management (IAM) system that uses a service oriented architecture (SOA) stack feature to simplify web access security for on- and off-premise applications.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

OpenIAM

Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Enterprise Mobility University: Mobile Device Management and BYOD Classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom will provide a mobile landscape overview, along with strategies for staying afloat in this BYOD era.
Posted: 06 Sep 2013 | Premiered: 16 Aug 2013

SearchCIO.com

You Are the Target - But You Don't Have To Be with Effective Authentication
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: In this analyst report by Frost & Sullivan, uncover 5 case studies on organizations of all sizes that found passwords to be subpar in security measures. Learn how they benefited from a multi-factor authentication platform, which ensured that only authorized users could access their private, dynamic networks.
Posted: 14 Nov 2013 | Published: 31 Aug 2013

RSA, The Security Division of EMC

Twelve Recommendations For Your Security Program In 2014
sponsored by TITUS
WHITE PAPER: This Forrester Research, Inc. report highlights how the IT environment requires a more customer-oriented business, and 4 ways that IT security teams are now responsible for driving this initiative. Click now for 12 security strategy best practices designed to last.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

TITUS

Handbook: Identity and Access Management
sponsored by CA Technologies.
EGUIDE: This Tech Guide on identity and access management (IAM) from SearchSecurity.com outlines the issues associated with IAM programs, how to build an effective strategy, why privilege creep has become such a challenge, and more!
Posted: 26 Jul 2013 | Published: 26 Jul 2013

CA Technologies.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement