IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Network Authentication Reports
Utilizing Customer IAM to Better Enable and Protect Your Organization
sponsored by CA Technologies.
WHITE PAPER: This white paper explores customer identity and access management (CIAM) and how to enable and secure multiple channels of customer interaction.
Posted: 15 Jun 2015 | Published: 16 Jul 2014

CA Technologies.

Access + Federation = Better Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Find out how federated SSO, when combined with access management, enables you to authenticate users in the domain where their identities are stored and provide access management for any app, including mobile. View now and learn how to centralize access control for all types of clients.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

In What Circumstances are Malaysians Willing to Use Biometrics in Airports
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on Malaysia and revealed how Malaysians are willing to give up some sensitive personal information in return for increased security. What other circumstances are they willing to provide biometric info to verify identities in airports? Download today and find out the facts.
Posted: 30 Sep 2015 | Published: 16 Sep 2015


Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

What is an Identity Provider and Why Do I Need to Become One
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014


Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and IntelĀ®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and IntelĀ®

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Next-Gen Identity: Secure App Access
sponsored by Ping Identity Corporation
WEBCAST: Learn how to control user access to systems and apps to avoid identity theft nightmares in this brief webcast.
Posted: 27 Oct 2015 | Premiered: Aug 14, 2015

Ping Identity Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement