IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization and Accounting Reports
 
Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

Preventing Insider Cyber Attacks
sponsored by IBM
WHITE PAPER: Access this white paper to learn how one identity and access management platform enables you to view all user activity and mitigate internal and external breach risk.
Posted: 27 Feb 2015 | Published: 17 Sep 2014

IBM

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource highlights the benefits of a federated identity service for organizations with scalable user environments.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Radiant Logic, Inc.

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement