IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization, and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization, and AccountingReports
 
Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Evaluating File Sync and Share Solutions
sponsored by Dropbox for Business
WHITE PAPER: This resource offers a 12-question checklist to go through when evaluating file sync and share vendors.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Enhancing the Customer Experience and Securing Endpoints with Biometrics
sponsored by NEC Corporation of America
TRANSCRIPT: This resource introduces NEC Corporation's NeoFace suite, a set of highly accurate facial recognition tools that use advanced facial processing and matching algorithms, and describes the business applications of biometrics.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

NEC Corporation of America

Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST: This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

What is an Identity Provider (IdP), and Why Do I Need One?
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Cloud-Based Application Security
sponsored by Hewlett-Packard Company
EGUIDE: Uncover three key best practices for preventing security breaches, and discover how to ensure cloud application security amid a cloud application migration.
Posted: 04 Oct 2014 | Published: 04 Oct 2014

Hewlett-Packard Company

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement