IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Password Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
Password ProvisioningReports
 
How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
WHITE PAPER: The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password.
Posted: 14 Feb 2011 | Published: 11 Feb 2011

Dell Software

IT in Europe: Breaking the Code: Are passwords destined for obscurity?
sponsored by SearchSecurity.co.UK
EZINE: This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

SearchSecurity.co.UK

Forrester Report: The Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
ANALYST REPORT: This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
Posted: 08 Apr 2011 | Published: 03 Nov 2008

Oracle Corporation

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST: Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

General Computing Controls Insight for PeopleSoft
sponsored by Approva Corporation
DATA SHEET: Approva's General Computing Controls Insight for PeopleSoft monitors configurable settings within PeopleSoft Enterprise and automatically alerts you of inappropriate values or changes in system settings which could lead to control violations.
Posted: 02 Jul 2008 | Published: 01 Jan 2007

Approva Corporation

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement