IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

IAM

RSS Feed    Add to Google    Add to My Yahoo!
IAMReports
 
Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Compliance Tips and Tricks for the Digital Age
sponsored by OpenText
EGUIDE: This expert e-guide reveals four valuable tips to dodge compliance challenges and meet regulatory requirements.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

OpenText

HID Global’s Identity Assurance SMB Solution
sponsored by HID
DATA SHEET: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

Best Practices for Deploying Cloud
sponsored by Scalr
EGUIDE: This expert e-guide reveals why cloud industry expert David Linthicum believes clouds are more secure than traditional IT systems, as well as hybrid clouds taking over in the future.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Scalr

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

The Convergence of IT Security and Physical Access Control
sponsored by HID
WHITE PAPER: Read more on the challenges, deployment options and results associated with convergence of using a single credential to secure access to IT resources and physical access control.
Posted: 01 Aug 2014 | Published: 13 May 2014

HID

Continuous Application Availability With EMC VPLEX
sponsored by Bull
WHITE PAPER: This whitepaper discusses the effectiveness of "continuous availability" programs as compared to traditional DR and HA, and takes a look at the EMC deployment model for continuous application availability.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Bull

Baffled by managing digital identity?
sponsored by ComputerWeekly.com
RESOURCE: Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IAM White Papers | IAM Multimedia | IAM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement