IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

NAC

RSS Feed    Add to Google    Add to My Yahoo!
NAC Reports
 
An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: To secure Amazon Web Services, users need to do their part by being smart about IAM permissions and AWS security groups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

DevOps on IBM z Systems E-guide
sponsored by IBM
EGUIDE: This e-guide explains why adopting DevOps can result in more efficient and effective applications with continuous process improvement. Read now to ensure that any changes and enhancements to software are based on real customer feedback.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

Physician Data Access without Sacrificing Patient Privacy
sponsored by SafeNet, Inc.
CASE STUDY: In this white paper, you'll explore how one Dutch hospital system secured physician access to sensitive hospital resources while complying with patient privacy regulations through strong authentication.
Posted: 13 Aug 2015 | Published: 24 Jun 2015

SafeNet, Inc.

Intro to Mainframe Security
sponsored by IBM
EGUIDE: Access this resource to learn about a mainframe security platform and how it offers an ecosystem of security solutions.
Posted: 02 Mar 2015 | Published: 04 Feb 2015

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
NAC White Papers | NAC Multimedia | NAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement