IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed    Add to Google    Add to My Yahoo!
User Authentication Reports
 
Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Challenges and Benefits of Making a Business Case for IAM
sponsored by Nexmo
EGUIDE: This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nexmo

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement