IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed    Add to Google    Add to My Yahoo!
Authorization Codes Reports
Expert Advice - 20 Practical Tips on Authentication and Access Management from Practiced Professionals
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn 20 expert tips to ramping up security through single sign-on and strong authentication.
Posted: 21 Sep 2015 | Published: 05 May 2015


Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014


Transform and Protect your Customers' Mobile Moments with Seamless Authentication
sponsored by Okta
WHITE PAPER: In this white paper, you will learn the 8 characteristicsthat users look for when evaluating mobile authentication and how to secure data while providing a positive customer experience.
Posted: 28 Sep 2015 | Published: 17 Sep 2014


Information Security – May 2014
sponsored by
EZINE: The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Refresh Authentication Choices to Improve Mobile Workforce Remote Access
sponsored by Okta
WHITE PAPER: This white paper presents the 9 top recommendations for strengthening your IDaaS strategy to secure remote access on all endpoints.
Posted: 09 Sep 2015 | Published: 28 Jan 2015


Maintaining Compliance in the New Era of Cloud Apps and Shadow Data
sponsored by Elastica
WHITE PAPER: This white paper examines how to leverage cloud apps and services while staying safe, secure, and compliant.
Posted: 04 Sep 2015 | Published: 31 Dec 2014


Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement