IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access Control Reports
 
Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014

IBM

Centricity™ Cardio Enterprise Solution for the Echo Lab
sponsored by GE Healthcare
WHITE PAPER: Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.
Posted: 04 May 2015 | Published: 04 May 2015

GE Healthcare

eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Case Study: Ensuring Automated Access Governance
sponsored by RSA
CASE STUDY: In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.
Posted: 06 May 2015 | Published: 18 Mar 2015

RSA

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

Securing Shared Data through FSS systems
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how a robust file sync and share (FSS) system can secure data accessed by collaborators.
Posted: 29 Apr 2015 | Published: 30 Dec 2014

IntraLinks, Inc

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement