IT Management  >   Systems Operations  >   Security  >   AAA  >  

Network Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Network Authentication Reports
 
Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

The Curious Case of API Security: Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This resource delves into the top threats facing APIs, exploring how these attacks are carried out and how you can thwart them. Read on to learn how to keep your APIs secure.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Axway

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Specification IAM Server Control
sponsored by FoxT
WHITE PAPER: This white paper teaches you how to enable holistic identity management, strong authentication, granular control, and SSO for users while mitigating unwanted access.
Posted: 17 Dec 2015 | Published: 02 Dec 2015

FoxT

Utility Protects Servers and Simplifies Compliance with Access Management
sponsored by FoxT
CASE STUDY: Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.
Posted: 06 Jan 2016 | Published: 04 Dec 2015

FoxT

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement