Software  >   Systems Software  >   Security Software  >  

Password Managers (Software)

RSS Feed    Add to Google    Add to My Yahoo!
Password Managers (Software) Reports
 
Password Management Project Roadmap
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.

PortalGuard: Strengthening Authentication to Adapt to Changing Circumstances™
sponsored by PistolStar, Inc.
PRODUCT OVERVIEW: PortalGuard is a password authentication and security solution that allows end-users to authenticate and manage a portal password directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives.
Posted: 26 Aug 2009 | Published: 26 Aug 2009

PistolStar, Inc.

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

The New Encryption Generation: Closing the Gap
sponsored by CREDANT Technologies
WHITE PAPER: This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

CREDANT Technologies

Eliminating Notes ID File Password Management: A Ground-breaking Alternative
sponsored by PistolStar, Inc.
WHITE PAPER: Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

PistolStar, Inc.

MarketScope for Enterprise Single Sign-On Products, 2006
sponsored by Citrix
WHITE PAPER: Enterprise single sign-on reduces the burden of password issues for admins by simplifying the authentication process for users. In this Gartner analysis get a look at several different single sign-on products and how they rate on five different...
Posted: 11 Jan 2007 | Published: 19 Jun 2006

Citrix

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

The Authentication Scorecard
sponsored by RSA
WHITE PAPER: This white paper details an authentication scorecard that helps your organization select the authentication solution that is best for your company. Learn how to understand and evaluate the most appropriate authentication technologies available.
Posted: 22 Mar 2007 | Published: 01 Mar 2007

RSA

Guide: Desktop Authority Password Self-Service
sponsored by ScriptLogic Corporation
WHITE PAPER: Desktop Authority® Password Self-Service™ provides an easy-to-use, robust system for allowing users to reset their own forgotten passwords or locked accounts, eliminating the biggest source of help desk calls.
Posted: 27 Aug 2009 | Published: 03 Jun 2009

ScriptLogic Corporation

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement