IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Password Policies

RSS Feed    Add to Google    Add to My Yahoo!
Password PoliciesReports
 
One Time Passwords for Mobile Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how more financial institutions are adopting mobile authentication for on line banking and deploying mobile platforms.
Posted: 24 Jul 2014 | Published: 07 Apr 2014

HID

Stay on Top of Threats: Use Next Generation Security for Protection
sponsored by IBM
WHITE PAPER: This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.
Posted: 16 Apr 2013 | Published: 31 Oct 2012

IBM

Portal Authentication: A Balancing Act Between Security, Usability & Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Unified and Intelligent Identity and Access Management
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 08 Jul 2011 | Published: 08 Jul 2011

Dell Software

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

The Total Economic Impact of CA Identity Manager
sponsored by CA Technologies.
WHITE PAPER: In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found.
Posted: 02 Mar 2010 | Published: 19 Feb 2010

CA Technologies.

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement