ComputerWeekly.com Research Library

Powered by Bitpipe.com

Password Management Research

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • Contextual Authentication: A Multi-factor Approach

    Sponsored by: PortalGuard

    This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.

  • Two-factor Authentication: A Tokenless Approach

    Sponsored by: PortalGuard

    Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.

  • Enterprise Single Sign On

    Sponsored by: tools4ever

    With organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.

  • IT in Europe: Breaking the Code: Are passwords destined for obscurity?

    Sponsored by: TechTarget ComputerWeekly.com 

    This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.

  • Top 10 Tips to Make Access to SaaS, Enterprise Class Secure

    Sponsored by: Intel

    In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  •  Password Self Help – Password Reset for IBM i

    Sponsored by: Safestone Technologies

    Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.

  • Implementing Database Security and Auditing - Authentication and Password Security

    Sponsored by: IBM

    In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • Forrester Report: The Total Economic Impact of Oracle Identity Manager

    Sponsored by: Oracle Corporation

    This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.

  • E-Book: Technical Guide on Managing Identities and Access Control

    Sponsored by: CA Technologies

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Symantec 2010 SMB Information Protection Survey

    Sponsored by: Symantec Corporation

    Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.

  • RSA SecurID extension for the IBM System i

    Sponsored by: Safestone Technologies

    White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • Password Management Best Practices

    Sponsored by: Hitachi ID Systems, Inc.

    This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.

  • Password Management Project Roadmap

    Sponsored by: Hitachi ID Systems, Inc.

    As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.

  • Defining Identity Management

    Sponsored by: Hitachi ID Systems, Inc.

    This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

  • How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)

    Sponsored by: BeyondTrust Corporation

    This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.

  • Improving Identity and Access Management in an SAP Environment

    Sponsored by: Dell Software

    In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.

  • Managing Identities and Access Control

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  • Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment

    Sponsored by: Dell Software

    This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.

  • Authentication in the Enterprise: Current and Changing Requirements

    Sponsored by: PistolStar, Inc.

    This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.