AAA Research
-
Infographic: 5 cybersecurity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comThe key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
-
IT Priorities 2020: After Covid-19, security goes back to basics
Sponsored by: TechTarget ComputerWeekly.comThis year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
-
Making Sense of Zero-Trust Security
Sponsored by: TechTargetAs security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
-
Implementing Database Security and Auditing - Authentication and Password Security
Sponsored by: IBMIn order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
Sponsored by: Hewlett-Packard EnterpriseThis exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
-
Information Security Magazine - September 2009: Readers’ Choice Awards
Sponsored by: Information Security MagazineThis issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
-
Information Security Magazine: August Issue
Sponsored by: TechTarget SecurityIdentity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
-
Information Security – May 2014
Sponsored by: TechTarget SecurityThe online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
-
Insider Security Threats: What CISOs Can Do to Mitigate Them
Sponsored by: Preempt SecurityInsider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
Sponsored by: IntelTraditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
-
Internet Security and Acceleration Server 2006
Sponsored by: MicrosoftISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
-
Internet-Scale Identity Systems:An Overview and Comparison
Sponsored by: Ping Identity CorporationThis white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
-
Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
Sponsored by: GeoTrust, Inc.This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
-
ISM December 2012
Sponsored by: TechTarget SecurityIn this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
-
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
Sponsored by: TechTarget ComputerWeekly.comThis feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
-
IT Priorites 2020 - After Covid 19 security goes back to basics
Sponsored by: TechTarget ComputerWeekly.comThis year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
-
IT Security: Built-In Protection with Intel vPro Technology
Sponsored by: IntelNew security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
Keeping Your Data Safe and Your Networks Connected
Sponsored by: SonicWALLThis whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Sponsored by: PistolStar, Inc.This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
-
Manage with ease: Get peace of mind with HP and Windows Embedded
Sponsored by: Hewlett Packard EnterpriseIn this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
-
Managing Identities and Access Control
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.