IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access ControlReports
 
AWS Cloud Security
sponsored by CloudPassage
WHITE PAPER: Security and risk professionals should access this Forrester research report to learn about a security solution that provides infrastructure plus a wide set of IT services.
Posted: 29 Aug 2014 | Published: 21 Feb 2014

CloudPassage

Providing a single source for secure identity solutions
sponsored by HID
BROCHURE: Access this brochure to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.

Figuring out FIDO
sponsored by HID
WEBCAST: This expert webcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

The Forrester Wave™: Privileged Identity Management, Q1 2014
sponsored by Centrify Corporation
ANALYST REPORT: This detailed report highlights the latest findings surrounding the privileged identity management (PIM) market within the past three years.
Posted: 22 Aug 2014 | Published: 03 Feb 2014

Centrify Corporation

Identity management compliance: How IAM systems support compliance
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the identity management and compliance relationship, including how to ensure IAM technology and processes effectively support enterprise compliance.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

Figuring out FIDO
sponsored by HID
PODCAST: This expert podcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO Alliance.
Posted: 11 Aug 2014 | Premiered: Aug 6, 2014

HID

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement