Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER:
Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014
|
|
|
Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER:
This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014
|
|
|
Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST:
Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013
|
|
|
Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER:
This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER:
With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013
|
|
|
Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by Globalscape
CASE STUDY:
This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013
|
|
|
Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE:
This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014
|
|
|
How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER:
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014
|
|
|
Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER:
Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013
|
|
|
Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER:
This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011
|
|
|
A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER:
Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014
|
|
|
Definitive Guide to Next Generation Network Access Control
sponsored by Forescout Technologies, Inc.
WHITE PAPER:
This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
Posted: 28 Apr 2014 | Published: 28 Apr 2014
|
|
|
Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER:
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010
|
|
|
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER:
This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010
|
|
|
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER:
This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010
|
|
|
The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER:
This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014
|
|
|
A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER:
This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014
|
|
|
How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER:
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
|
|
|
How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER:
Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014
|
|
|
Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER:
View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
|
|
|
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER:
This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013
|
|
|
Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER:
This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014
|
|
|
Secure Mobile Devices with a Next Generation Firewall
sponsored by Dell Software
WHITE PAPER:
This white paper provides one suggestion for securing your mobile devices with a next generation firewall.
Posted: 11 Mar 2014 | Published: 11 Mar 2014
|
|
|
When Millions Need Access: Identity Management in an Interconnected World
sponsored by IBM
WHITE PAPER:
This whitepaper covers an automation solution that will allow you to monitor the ever-growing number of access points to your organization's sensitive data.
Posted: 06 Mar 2014 | Published: 13 Feb 2013
|
|
|
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER:
This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013
|
|