IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Remote AuthenticationReports
 
How To Use SIEM Technology To Identify Unauthorized Access Attempts
sponsored by Hewlett-Packard Company
EGUIDE: Many organizations are utilizing SIEM technology to help prevent data theft. This expert e-guide explains how SIEM technology can identify unauthorized access attempts to your network.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Hewlett-Packard Company

Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Securing Your Private Keys as Best Practice for Code Signing Certificates
sponsored by Thawte Inc.
WHITE PAPER: This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

SSL Certificate Management: Avoiding Common Mistakes
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
Posted: 15 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

Best Practices for Managing and Understanding Mobile Authentication
sponsored by OpenTrust
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

OpenTrust

Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
sponsored by ADT
EGUIDE: This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

ADT
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement