IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Identification Codes

RSS Feed    Add to Google    Add to My Yahoo!
Carrier Identification Codes Reports
 
The Essential OAuth Primer - Understanding OAuth for Securing Cloud APIs
sponsored by Ping Identity Corporation
WHITE PAPER: In order to create a consistent, flexible identity and policy architecture for web apps, services, devices, and desktop clients attempting to communicate with cloud APIs, you need to eliminate the password anti-pattern. This white paper explores one such approach in depth - view now to learn if it lives up to its promises.
Posted: 26 Oct 2015 | Published: 14 May 2014

Ping Identity Corporation

Modernizing Active Directory for Azure and Office 365
sponsored by Dell Software
WHITE PAPER: This white paper highlights best practices for modernizing and integrating your in-premises AD into Azure so that you can enjoy less administration of on-premises hardware and software and introduce your organization to identity as a service.
Posted: 10 May 2016 | Published: 31 Dec 2015

Dell Software

Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how you can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

IBM

What Are the Best Ways to Improve SMB Security?
sponsored by CDW
EGUIDE: Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.
Posted: 19 May 2016 | Published: 18 May 2016

CDW

Why Healthcare SSO is a Must-Have
sponsored by Aventura
EGUIDE: As healthcare organizations adopt more cloud services, IT needs to mitigate poor password practices in their user base to avoid costly data breaches. This expert e-guide reviews why single sign-on (SSO) platforms have risen in popularity in healthcare organizations and presents the benefits of implementing SSO for your user base.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Aventura

IBM Guardium: Database security tool overview
sponsored by IBM
EGUIDE: This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.
Posted: 06 May 2016 | Published: 03 May 2016

IBM

IAM Beyond Traditional WAM
sponsored by Ping Identity Corporation
WHITE PAPER: Explore the 5 key attributes of API security in this exclusive white paper. Additionally, review the top 5 considerations for WAM migration and how to secure access to your IaaS/AWS environment.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement