Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE:
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
October Essentials Guide on Mobile Device Security
sponsored by TechTarget Security
ESSENTIAL GUIDE:
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012
|
|
|
Password Security Guidelines
sponsored by TechTarget
RESOURCE:
In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019
|
|
|
Managing Identities and Access Control
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection;Â developing policies for privileged users; and how to implement and maintain user roles.
Posted: 24 Feb 2010 | Published: 24 Feb 2010
|
|
|
Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER:
This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011
|
|
|
Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER:
This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012
|
|
|
Modernize Your Approach to Authentication
sponsored by TechTarget Security
EBOOK:
This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012
|
|
|
Moving Beyond Ad Hoc Mobile Security
sponsored by TechTarget Security
EZINE:
Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016
|
|
|
Moving Past the Password? Not So Fast
sponsored by TechTarget Security
EBOOK:
The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016
|
|
|
Multifactor authentication methods, use cases and products
sponsored by TechTarget Security
EBOOK:
Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Posted: 16 Nov 2020 | Published: 16 Nov 2020
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005
|
|
|
Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER:
This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013
|
|
|
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER:
Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009
|
|
|
Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER:
This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|
|
Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER:
As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012
|
|
|
Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
sponsored by Imprivata
CASE STUDY:
By incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
Posted: 24 Jan 2008 | Published: 01 Jan 2007
|
|
|
Password Management Best Practices
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER:
This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
Posted: 03 Jun 2010 | Published: 03 Jun 2010
|
|
|
Password Management Project Roadmap
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER:
As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
Posted: 03 Jun 2010 | Published: 03 Jun 2010
|
|
|
Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER:
This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014
|
|
|
PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE:
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013
|
|
|
Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
sponsored by ADT
EGUIDE:
This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
Posted: 05 Sep 2013 | Published: 05 Sep 2013
|
|
|
Presentation Transcript: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PRESENTATION TRANSCRIPT:
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
Posted: 10 Aug 2012 | Published: 10 Aug 2012
|
|
|
Presentation Transcript: Changing Authentication Options
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT:
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011
|
|