AAA Research
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
Best Practices for mobile authentication
Sponsored by: TechTarget SecurityAccess this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
-
Building the Right Mobile Security Toolkit
Sponsored by: TechTarget SecurityDue to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
BYOD Security Policy Considerations and Best Practices
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
-
BYOPC Strategy: Policies and Problem Solving
Sponsored by: TechTarget SecurityCreating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
-
Authentication 101: What You Need to Know
Sponsored by: HYPRWhat does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
Authentication Tokens: The Key to Secure PCs and Data
Sponsored by: Aladdin Knowledge SystemsThis white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Best Practices for Archiving Lotus Domino Environments
Sponsored by: Symantec CorporationThis webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
-
Best Practices for Deploying LAN Security and NAC
Sponsored by: Nevis NetworksDownload this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
-
Better Leveraging Active Directory
Sponsored by: Radiant Logic, Inc.Find out how your business can have a better and more efficient identity management system in this white paper.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
Bloomberg Personal Vault
Sponsored by: BloombergAccess this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Building a Secure and Compliant Windows Desktop
Sponsored by: BeyondTrust CorporationRemoving administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
-
Building an Unstructured Data Protection Program
Sponsored by: STEALTHbitsIn this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
-
Cascading Risk
Sponsored by: Core Security TechnologiesThis webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
Sponsored by: TechTarget CIOPrescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.