IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

User ID Management

RSS Feed    Add to Google    Add to My Yahoo!
User ID Management Reports
 
Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Five New Rules for Enterprise File Sync and Share Service Providers
sponsored by Citrix
RESOURCE: Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.
Posted: 16 May 2016 | Published: 18 Nov 2014

Citrix

Your Guide to the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Stop Data Breaches with Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Examine how privileged access management can help stop data breaches. Learn now about a 3-step process for blocking attackers' attempts to carry out crimes in your organization.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

In denial about DDoS: Defense planning falls short
sponsored by SearchSecurity.com
EZINE: In this expert e-guide, you will learn the finer points of DDoS attacks and what your organization needs to do to protect itself.
Posted: 02 Feb 2015 | Published: 30 Jan 2015

SearchSecurity.com

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement