IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Remote Authentication Reports
The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


What If Your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc.
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 04 Sep 2015 | Premiered: 20 Jan 2015

Dell, Inc.

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WHITE PAPER: This resource discusses how you can keep your most valuable data out of hackers' hands with a range of advanced technologies, including encryption and stronger authentication.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Imation Corp.

Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Strengthen Security with Intelligent Identity and Access Management
sponsored by IBM
WHITE PAPER: View this white paper to learn how to control user access to sensitive assets and monitor their actions after they gain access.
Posted: 02 Mar 2015 | Published: 09 Apr 2014


Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Expert Advice - 20 Practical Tips on Authentication and Access Management from Practiced Professionals
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn 20 expert tips to ramping up security through single sign-on and strong authentication.
Posted: 21 Sep 2015 | Published: 05 May 2015


The Essential OAuth Primer - Understanding OAuth for Securing Cloud APIs
sponsored by Ping Identity Corporation
WHITE PAPER: In order to create a consistent, flexible identity and policy architecture for web apps, services, devices, and desktop clients attempting to communicate with cloud APIs, you need to eliminate the password anti-pattern. This white paper explores one such approach in depth - view now to learn if it lives up to its promises.
Posted: 26 Oct 2015 | Published: 14 May 2014

Ping Identity Corporation

Provide Identity Integration Into Office 365 and Beyond
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper walks you through the challenges of identity integration and examines the strategies available to simplify the process.
Posted: 26 Oct 2015 | Published: 30 Sep 2015

Ping Identity Corporation

Security Strategies for Today's Data Warehouses
sponsored by IBM
WHITE PAPER: This white paper discusses the necessity of an end-to-end security strategy for data warehouses and gives tips for building that kind of strategy.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement