IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Remote Authentication Reports
 
20 Practical Tips for Single Sign-On Implementation
sponsored by Imprivata
WHITE PAPER: Uncover 20 valuable tips to ensure successful SSO for your organization, so that your care providers can spend less time remembering passwords and more time treating patients.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Imprivata

Making the Move to Dynamic Multifactor Authentication
sponsored by iovation, Inc.
WHITE PAPER: Passwords. The most hated thing we can't live without. Take a look at new advances in multifactor authentication that can create a more intuitive experience for the end user. Uncover how MFA works, the state of MFA adoption, and 5 reasons to move to a flexible MFA approach.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

iovation, Inc.

Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Five Pitfalls to Avoid for a Pain-Free Two-Factor Authentication Deployment
sponsored by RSA
RESEARCH CONTENT: In this Forrester Research report, examine 5 pitfalls that security pros should take care to avoid when deploying a two-factor authentication tool. For each pitfall, discover actionable recommendations that will help you ensure a smooth and seamless deployment.
Posted: 23 Aug 2017 | Published: 23 May 2016

RSA

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

Unified Endpoint Management for All Device Types
sponsored by IBM
WHITE PAPER: Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

Simplify Authentication with Personal Identity Verification
sponsored by HID
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement