Standards  >   Network Protocols  >   Network Authentication Protocols  >  

PAP

RSS Feed    Add to Google    Add to My Yahoo!
PAPReports
 
Controlling laptop and smartphone access to corporate networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

Multi-Step Authentication and Why You Should Use It
sponsored by Global Knowledge
WHITE PAPER: Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
Posted: 05 Sep 2013 | Published: 08 Aug 2013

Global Knowledge

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning
sponsored by Security Weaver
WHITE PAPER: For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

Security Weaver

Strong Authentication: Securing Identities and Enabling Business
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
Posted: 08 Jul 2008 | Published: 01 Jul 2008

Aladdin Knowledge Systems

Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008

PistolStar, Inc.

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Hot Tips for Securing Your Wireless Network
sponsored by Sophos, Inc.
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos, Inc.

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
TECHNICAL ARTICLE: Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

Dell Software

An Overview and Competitive Analysis of the One-Time Password (OTP) Market
sponsored by RSA, The Security Division of EMC
WHITE PAPER: The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

RSA, The Security Division of EMC

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PAP White Papers | PAP Multimedia | PAP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement