The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK:
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012
|
|
|
Applications and best practices to keep your mobile devices secure
sponsored by TechTarget Security
EGUIDE:
Uncover best practices for keeping your mobile devices and applications secure.
Posted: 06 Mar 2012 | Published: 06 Mar 2012
|
|
|
Best Practices for mobile authentication
sponsored by TechTarget Security
EGUIDE:
Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012
|
|
|
E-Guide: Are 'strong authentication' methods strong enough for compliance?
sponsored by TechTarget Security
EGUIDE:
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
Posted: 27 Sep 2011 | Published: 26 Sep 2011
|
|
|
Securing the enterprise application layer: Expert Guidelines
sponsored by TechTarget Security
EGUIDE:
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation. Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011
|
|
|
Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER:
This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012
|
|
|
IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER:
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012
|
|
|
Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER:
Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011
|
|
|
The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER:
It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012
|
|
|
Enterprise Single Sign On
sponsored by tools4ever
WHITE PAPER:
With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
Posted: 18 May 2012 | Published: 17 May 2012
|
|
|
Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER:
Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012
|
|
|
Simplifying and Securing Group Policy Management
sponsored by Dell Software
WHITE PAPER:
Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
Posted: 13 Apr 2012 | Published: 31 Dec 2011
|
|
|
Protecting Corporate Data in the "BYOD" Environment
sponsored by Apperian, Inc.
WHITE PAPER:
While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
Posted: 10 Feb 2012 | Published: 09 Feb 2012
|
|
|
Presentation Transcript:From Wow to How 2: Virtual Desktops, Networking and the Cloud
sponsored by Citrix and Microsoft
PRESENTATION TRANSCRIPT:
Learn about the various capabilities of virtual desktops beyond just VDI. Discover what role cloud computing plays in today’s enterprises and find out how to authorize desktop users from a single point of authentication.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
|
|
|
Understanding, Building and Securing an IAM Cloud Architecture
sponsored by OneLogin
PRESENTATION TRANSCRIPT:
This presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
|
|
|
Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER:
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011
|
|
|
Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
sponsored by StrikeForce Technologies
PRESENTATION TRANSCRIPT:
Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
Posted: 23 Nov 2011 | Published: 22 Nov 2011
|
|
|
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
sponsored by TechTarget ComputerWeekly.com
EZINE:
This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
|
|
|
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
sponsored by VeriSign EMEA
WHITE PAPER:
This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 26 Oct 2011 | Published: 26 Oct 2011
|
|
|
Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
sponsored by Intel
WHITE PAPER:
In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
Posted: 12 Oct 2011 | Published: 12 Oct 2011
|
|
|
The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST:
Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011
|
|
|
Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST:
Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011
|
|
|
The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST:
View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011
|
|
|
Securely Publish and Manage Web APIs with CloudControl
sponsored by Layer 7 Technologies
PRODUCT OVERVIEW:
Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011
|
|
|
Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER:
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011
|
|