IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization Codes

RSS Feed    Add to Google    Add to My Yahoo!
Authorization Codes Reports
IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


In What Circumstances are Malaysians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Malaysia and revealed how Malaysians are willing to give up some sensitive personal information in return for increased security. What other circumstances are they willing to provide biometric info to verify identities in airports? Download today and find out the facts.
Posted: 30 Sep 2015 | Published: 16 Sep 2015


5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015


Utilizing Customer IAM to Better Enable and Protect Your Organization
sponsored by CA Technologies.
WHITE PAPER: This white paper explores customer identity and access management (CIAM) and how to enable and secure multiple channels of customer interaction.
Posted: 15 Jun 2015 | Published: 16 Jul 2014

CA Technologies.

IAM Beyond Traditional WAM
sponsored by Ping Identity Corporation
WHITE PAPER: Explore the 5 key attributes of API security in this exclusive white paper. Additionally, review the top 5 considerations for WAM migration and how to secure access to your IaaS/AWS environment.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Information Security – May 2014
sponsored by
EZINE: The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement