AAA Research
-
Guide to Mobile Device Management Software
Sponsored by: TechTarget SecurityThis expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
Implementing a Zero-Trust Approach to Network Security
Sponsored by: TechTargetImplementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet Asia LtdIn this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet, Inc.This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Hot Tips for Securing Your Wireless Network
Sponsored by: SophosEveryone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
-
How can organizations get control over privileged identity management?
Sponsored by: One IdentityRecent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
How IAM Addresses Unstructured Content Security Risks
Sponsored by: STEALTHbitsIdentity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.
-
How IAM has Evolved on the Cloud: The Good and the Bad
Sponsored by: IBMLearn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
-
How IAM Systems Support Compliance
Sponsored by: Beta SystemsMany organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
-
How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
Sponsored by: BeyondTrust CorporationThis white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
-
How SSL and TLS Secure Network Transactions
Sponsored by: GeoTrust, Inc.This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
How to Properly Move into the Cloud
Sponsored by: Forum SystemsThis e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
IBM Optim Data Privacy Solution for SAP
Sponsored by: IBMThe IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
Sponsored by: Dell SoftwareLearn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
-
IFS Enterprise Asset Management - EAM/CMMS
Sponsored by: IFSIFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit.
-
Implementing a Telecommuting Program
Sponsored by: Avaya Inc.This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.