IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Network Authentication Reports
 
Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?
sponsored by Simeio
WHITE PAPER: When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Simeio

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Security and risk management leaders responsible for IAM should be aware of functional differences between on-premises and cloud-delivered identity governance and administration (IGA). This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's IGA products as well as, a market overview.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Thycotic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement