Research Library

Powered by

All Research Sponsored By:Hitachi ID Systems, Inc.

  • Secure Architecture for Mobile Device Access to On-Premise Applications

    This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.

  • Presentation Transcript: Effective and Secure User Account Provisioning

    Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.

  • Password Management Best Practices

    This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.

  • Password Management Project Roadmap

    As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.

  • Defining Identity Management

    This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.