IT Management  >   Systems Operations  >   Security  >   AAA  >  

Remote Authentication

RSS Feed    Add to Google    Add to My Yahoo!
Remote Authentication Reports
 
Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013

HID

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Virtualized Desktops in Healthcare
sponsored by Imprivata
WHITE PAPER: Ensure a successful virtual desktop infrastructure (VDI) deployment by learning how to overcome the most common barriers, such as clinical adoption, high overhead costs, and meeting new authentication needs.
Posted: 09 Apr 2015 | Published: 20 Nov 2014

Imprivata

ECPS and HIPAA Compliance through Two-Factor Authentication
sponsored by VASCO Data Security International
WHITE PAPER: This white paper explores two factor authentication and how it protects users and sensitive data for web-based and mobile applications in healthcare organizations.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

VASCO Data Security International

Grow Business Consumer Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Posted: 12 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement