IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Identity Management and Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Identity Management and Access ControlReports
 
NEC Biometrics Solutions Podcast: Enhancing the customer experience and securing endpoints
sponsored by NEC Corporation of America
PODCAST: This podcast reveals a biometrics solution that will help identify fraud across various industries. NEC's NeoFace uses a highly accurate, fast and flexible facial recognition tool for authentication purposes.
Posted: 10 Oct 2014 | Premiered: Oct 2, 2014

NEC Corporation of America

IBM InfoSphere Guardium for federal information systems
sponsored by IBM
DATA SHEET: This data sheet explains how continuous monitoring can secure sensitive data and simplify SCAP compliance validation.
Posted: 03 Oct 2014 | Published: 30 Apr 2013

IBM

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
BROCHURE: This brochure explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

KAS BANK Discovers a Better Way to Secure High-value Transactions
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a solution that delivered the highest level of security with a reusable infrastructure.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Establishing Trust in Online Identities
sponsored by HID
BROCHURE: Access this brochure to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

Maximizing Data Security with WW Cloud Storage Gateways
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out about a cloud solution that provides reliable data protection.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

Riverbed Technology, Inc.

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement