IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed    Add to Google    Add to My Yahoo!
IAM Reports
 
Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

Case Study: How a Leading Bank Monitors All Its Data
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank gained the ability to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Global Authentication in Online Financial Services Leadership Award
sponsored by HID
WHITE PAPER: This white paper outlines a 6-step strategy to strengthening authentication to close vulnerabilities and mitigate advanced threats. Continue reading to learn the criteria authentication needs today to secure enterprise data.
Posted: 14 Aug 2015 | Published: 30 Dec 2014

HID

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

Strengthen Security with Intelligent Identity and Access Management
sponsored by IBM
WHITE PAPER: View this white paper to learn how to control user access to sensitive assets and monitor their actions after they gain access.
Posted: 02 Mar 2015 | Published: 09 Apr 2014

IBM

How to Securely Sync, Share, Collaborate, and Manage Business Content
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.
Posted: 18 May 2015 | Published: 16 Dec 2014

IntraLinks, Inc

IntralinksĀ® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement