Administration (Security) Reports

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

How IAM Addresses Unstructured Content Security Risks
sponsored by STEALTHbits
EGUIDE: Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
Posted: 11 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems