IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

NAC

RSS Feed    Add to Google    Add to My Yahoo!
NACReports
 
Building out an IAM Infrastructure and Strategy while Supporting Compliance Needs
sponsored by IBM
EGUIDE: In this expert E-Guide, Forrester Research's Andras Cser discusses what the steps should be when building out an IAM infrastructure and strategy.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

IBM

Best Practices for Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Dell Software

ActivID® Threat Detection Service
sponsored by HID
DATA SHEET: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Combining Security and the Cloud to Enhance Your Business
sponsored by GFI Cloud
EBOOK: This resource highlights the views of several tech influencers pertaining to security and the cloud. Each person provides valuable insight and explains how to implement them both into your business.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

GFI Cloud

Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by GlobalScape
CASE STUDY: This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013

GlobalScape

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Evaluating File Sync and Share Solutions
sponsored by Dropbox for Business
WHITE PAPER: This resource offers a 12-question checklist to go through when evaluating file sync and share vendors.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Cut through complexity: The key to IAM success
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
NAC White Papers | NAC Multimedia | NAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement