IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed   
Administration (Security) Reports
 
Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Citrix Systems, Inc.
sponsored by Symantec
WHITE PAPER: This case study reveals how Citrix Systems, Inc. wanted to move two-factor authentication (2FA) into the cloud to reduce costs and improve flexibility and reliability.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Symantec

Report: IAM Leadership Compass
sponsored by Janrain
WHITE PAPER: This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

4 Challenges Building Digital Payments is Creating and How to Address Them
sponsored by Applause
WHITE PAPER: This white paper explores how to build and test payment apps that are reliable and deliver a quality user experience. Learn about crowdtesting and how it can help you overcome 4 key challenges associated with building digital payment apps across web and mobile.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Applause

Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Why PCI DSS Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement