IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access Control Reports
 
Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Integrating Password Management with Enterprise Single Sign-On
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: In this document, you will compare password synchronization and reset tech to enterprise SSO, and examine how each addresses the pressing business problem of securing authentication. Discover how to integrate these dueling technologies, and identify several interoperability challenges.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Hitachi ID Systems, Inc.

Security Intelligence for the Financial Sector in 2015
sponsored by IBM
WHITE PAPER: This white paper examines the cyber-attacks the financial sector faced in 2014, discussing some of the broader trends of that year and what those trends mean for financial security going forward.
Posted: 09 Sep 2015 | Published: 30 Jun 2015

IBM

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Identity and Access Management (IAM) in the Cloud: Challenges Galore
sponsored by ForgeRock
EGUIDE: This expert e-guide explains why the biggest challenge for cloud services is identity provisioning. Inside, review several questions organizations must ask to build an effective cloud IAM solution.
Posted: 30 Nov 2015 | Published: 05 Nov 2015

ForgeRock

Identity as a Revenue Generator: Getting Started with Customer-Focused Identity Management
sponsored by ForgeRock
WHITE PAPER: This white paper helps you understand the essentials of customer-focused identity and how it allows you to engage with your customers. Access now and learn best practices for identity management and how you can better engage with your customers.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

Identity and Access Management Users Maximize Their ROI
sponsored by ForgeRock
WHITE PAPER: Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

ForgeRock

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Lancope
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement