Standards  >   Network Protocols  >  

Authentication Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Authentication ProtocolsReports
 
How to Turn Your Network into a Strategic Business Asset with Purview
sponsored by Extreme Networks
EBOOK: As IT departments prepare to create new solutions, they are often forced to choose between various platforms. Is your company choosing the right solution? View this eBook to learn more about Extreme Networks Purview, a network based business intelligence solution.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

COUNTING THE COST OF NETWORK EFFICIENCY
sponsored by Fluke Networks
WHITE PAPER: This white paper examines the financial benefits of improving network and application performance in terms of the impact on the business as well as the capital and operating expenditure, and how your team can make a business case for the tools you need to identify problems, resolve them quickly and improve performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Fluke Networks

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
sponsored by Bradford Networks
PRESENTATION TRANSCRIPT: Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

Bradford Networks

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Networking Basics: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement