IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization, and Accounting Reports
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

Expert Advice - 20 Practical Tips on Authentication and Access Management from Practiced Professionals
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn 20 expert tips to ramping up security through single sign-on and strong authentication.
Posted: 21 Sep 2015 | Published: 05 May 2015


The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

Strategies for Web and API Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, you'll learn about next-gen identity standards and requirements and how to secure access to apps - regardless of their environment.
Posted: 27 Oct 2015 | Published: 14 Jul 2014

Ping Identity Corporation

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Protecting and Preserving Archived Files
sponsored by Imation Corp.
WHITE PAPER: Access this white paper to learn how you can authenticate data and prevent file corruption for your archived data.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Imation Corp.

Avoid Threats on Mobile Health Devices with Healthcare Security Best Practices
sponsored by CloudMine
EGUIDE: Explore expert analyses on how to protect mobile health data and devices in 4 steps. Continue reading to learn 7 best practices for bolstering your mHealth security strategy
Posted: 28 Oct 2015 | Published: 07 Oct 2015

Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: Read this IDC Buyer's Case Study focused on how Grand Island Public Schools (GIPS) implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Posted: 29 Oct 2015 | Published: 30 Apr 2013

Centrify Corporation

IAM - The Foundation of Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.
Posted: 08 May 2015 | Published: 11 Dec 2014

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement