IT Management  >   Systems Operations  >   Security  >   AAA  >  

User ID

RSS Feed    Add to Google    Add to My Yahoo!
User ID Reports
 
Strengthen Security with Intelligent Identity and Access Management
sponsored by IBM
WHITE PAPER: View this white paper to learn how to control user access to sensitive assets and monitor their actions after they gain access.
Posted: 02 Mar 2015 | Published: 09 Apr 2014

IBM

Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

Next Generation Cloud Security
sponsored by Symantec
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014

IBM

Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement