IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Access Codes

RSS Feed   
Carrier Access Codes Reports
 
Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo & Microsoft
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

TOPICS: 
Lenovo & Microsoft

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

TOPICS: 
Jumio

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

TOPICS: 
HelpSystems

Büroalltag im Wandel: das Leben am digitalen Arbeitsplatz
sponsored by Citrix
WHITE PAPER: Hier erfahren Sie, wie ein sicherer, integrierter digitaler Arbeitsplatz Ihnen dabei hilft, einen besseren Kundendienst bereitzustellen, Leiharbeiter und mobile Mitarbeiter sicher einzugliedern und den Wettbewerbsvorteil auszubauen.
Posted: 22 Oct 2018 | Published: 09 Nov 2018

TOPICS: 
Citrix

Trends in Mobile User Authentication
sponsored by HID Global
EBRIEF: To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TOPICS: 
HID Global

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

TOPICS: 
STEALTHbits

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

TOPICS: 
SearchContentManagement

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

TOPICS: 
HYPR

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TOPICS: 
SearchSecurity.com

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

TOPICS: 
Adobe EchoSign
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement