IT Management  >   Systems Operations  >   Security  >   AAA  >  

User Authentication

RSS Feed    Add to Google    Add to My Yahoo!
User Authentication Reports
 
Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

Infographic: Safely Adopt Cloud Services Without Sacrificing Security
sponsored by F5 Networks
RESOURCE: In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

F5 Networks

Deploy an Enterprise Mobility Gateway to Optimize Access Control
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

How to Integrate Siloed Identities and Data
sponsored by Radiant Logic, Inc.
WHITE PAPER: This comprehensive white paper digs into the current fragmented landscape of identity infrastructures. Read on for expert tips on integrating identities and data out of silos.
Posted: 14 Dec 2015 | Published: 31 Dec 2012

Radiant Logic, Inc.

Research Report: Enabling the Full Potential of New Operating Systems
sponsored by Microsoft
WHITE PAPER: This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.
Posted: 01 Feb 2016 | Published: 30 Oct 2015

Microsoft

What is an Identity Provider and Why Do I Need to Become One
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Best Practices for Cloud-Based Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: In this expert e-guide, you'll learn the 6 best practices for implementing cloud-based IAM in your organization to avoid security vulnerabilities. View now to learn how to assess your IAM as a service (IAMaaS) options.
Posted: 11 Sep 2015 | Published: 03 Sep 2015

Radiant Logic, Inc.

SaaS Safety and Security: Taming the Office Password Monster
sponsored by Dashlane Inc.
WHITE PAPER: Learn if you're leaving the door open for hackers in this white paper as it shines a light on the many password management blunders. Discover how to keep login simple for your users without creating undue risk.
Posted: 24 Dec 2015 | Published: 23 Dec 2015

Dashlane Inc.

Customer Success Story: Unisys Video Case Study
sponsored by SecureAuth
VIDEO: This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 25 Jan 2016 | Premiered: 25 Jan 2016

SecureAuth
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement