IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed    Add to Google    Add to My Yahoo!
Authentication, Authorization and Accounting Reports
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

SSO in the Cloud and Mobile Era
sponsored by TechTarget
RESOURCE: Does enterprise single sign-on (SSO) provide adequate security? Our exclusive resource, SSO in the Cloud and Mobile Era, explores the promises and challenges ahead for SSO technology.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

TechTarget

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID Global

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement