IT Management  >   Systems Operations  >   Security  >   AAA  >  

Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Access CodesReports
 
Rising security concern for online and mobile banking
sponsored by HID
RESOURCE: This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014

HID

The Allure Behind Risk-Based Authentication
sponsored by CA Technologies.
EGUIDE: This expert e-guide reveals the draw to risk-based authentication, how to ensure secure API use occurs within the enterprise, and cyber threats moving to critical infrastructure.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

CA Technologies.

Spanish Engineering Organization Bridges Cost Savings with Business Efficiency Using HID Global’s Smart Card Solutions
sponsored by HID
CASE STUDY: This case study explains how a Spanish engineering organization used a smart card solution to overcome the obstacles of access control.
Posted: 05 Aug 2014 | Published: 25 Mar 2013

HID

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Enabling a secure and convenient online banking experience
sponsored by HID
BROCHURE: In this brochure, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

BYOD and Beyond: How to Deliver Enterprise Data Securely Across Operating Systems
sponsored by Citrix Systems, Inc.
WHITE PAPER: Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.4, iOS 7.1 and Windows Phone and Surface 8.1 versions – and the steps you should take to maintain security and control.
Posted: 01 Jun 2014 | Published: 01 Jun 2014

Citrix Systems, Inc.

A Case for Pager Replacement Presented by Dr. Larry Ponemon
sponsored by Imprivata
WEBCAST: Discover how communication inefficiencies can severely impact the healthcare industry, and how implementing a new, mobile communication technique can result in cost savings over time.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Imprivata

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement