IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Remote Authentication Reports
 
Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Security Strategies for Today's Data Warehouses
sponsored by IBM
WHITE PAPER: This white paper discusses the necessity of an end-to-end security strategy for data warehouses and gives tips for building that kind of strategy.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013

HID

ECPS and HIPAA Compliance through Two-Factor Authentication
sponsored by VASCO Data Security International
WHITE PAPER: This white paper explores two factor authentication and how it protects users and sensitive data for web-based and mobile applications in healthcare organizations.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

VASCO Data Security International

Solving the Office 365 Mobility Puzzle
sponsored by Okta
WHITE PAPER: This white paper provides an overview of how to simplify the migration and deployment process of Office 365 to mobile devices.
Posted: 28 Aug 2015 | Published: 19 Aug 2015

Okta

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement