IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
SignaturesReports
 
Spanish Engineering Organization Bridges Cost Savings with Business Efficiency Using HID Global’s Smart Card Solutions
sponsored by HID
CASE STUDY: This case study explains how a Spanish engineering organization used a smart card solution to overcome the obstacles of access control.
Posted: 05 Aug 2014 | Published: 25 Mar 2013

HID

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

Macdermid Offshore Solutions UKOffshore Solutions UK
sponsored by GFI
WHITE PAPER: Access this white paper to learn how you can leverage a single view of key software without integration and compatibility worries instead of different vendors for different pieces of software. You'll learn how ControlNow helps you ensure your primary servers are always up.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

GFI

Achieving Control Over Data Center Implementations and Operations
sponsored by Avocent
WHITE PAPER: Access this white paper to learn how certain data center management solutions can provide both access control and holistic monitoring services to ensure reliable, secure, and cost effective data center implementations.
Posted: 24 Nov 2014 | Published: 31 Jul 2010

Avocent

How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Stuck in a SIEM Rut?
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will help you make sure your security information and event management solution is improving your security posture.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement