IT Management  >   Systems Operations  >   Security  >  

Authentication, Authorization and Accounting

RSS Feed   
Authentication, Authorization and Accounting White Papers (View All Report Types)
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

7 Tough Questions to Ask Before Switching Certification Authorities
sponsored by Entrust, Inc.
WHITE PAPER: A certification authority is responsible for the issuance and management platform of digital certificates, which secure internal servers, web applications, emails and more. This resource offers 7 tough questions to ask before switching certification authorities.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

How to deploy cloud storage without compromising on security
sponsored by Nasuni
WHITE PAPER: In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.
Posted: 13 Dec 2017 | Published: 13 Dec 2017


Authentication-as-a-Service Improved
sponsored by Entrust, Inc.
WHITE PAPER: How are you securing your enterprise and dealing with authentication protocols? This resource offers an authentication-as-a-service strategy to aid your enterprise in improving its IAM security approach.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Entrust, Inc.

5 Signs You Need to Upgrade Your Legacy IA M System
sponsored by Identity Automation
WHITE PAPER: While 49% of business applications are now stored in the cloud, less than half of them are known or approved by the IT department, according to Ponemon Institute. This white paper reveals 5 signs you need to update your legacy identity and access management system.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018


It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement