Access Authentication and Authorization White Papers

(View All Report Types)
The Expanding Network Perimeter: How to Protect it With Unified Threat Management
sponsored by Sophos
WHITE PAPER: Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Sophos

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Improving Identity and Access Management in an SAP Environment
sponsored by Dell Software
WHITE PAPER: In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
Posted: 06 May 2010 | Published: 06 May 2010

Dell Software

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
sponsored by Radiant Logic, Inc.
WHITE PAPER: Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
Posted: 15 Mar 2011 | Published: 14 Mar 2011

Radiant Logic, Inc.

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.