Password Management Research
-
Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
Sponsored by: IBMThis multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
-
Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
Sponsored by: Bradford NetworksLearn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
-
Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationOracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Implementing an identity management solution
Sponsored by: SAP America, Inc.This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
-
The Evolution of Password Authentication and Management: A Simple Solution
Sponsored by: PistolStar, Inc.This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations.
-
The Role of Password Management in Achieving Compliance
Sponsored by: PistolStar, Inc.This paper will look at the dramatic impact password management solutions have had on organizations.
-
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Sponsored by: PistolStar, Inc.This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
-
Eliminating Notes ID File Password Management: A Ground-breaking Alternative
Sponsored by: PistolStar, Inc.Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
-
DigitalPersona Pro
Sponsored by: DigitalPersonaThis free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.