AAA Research
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
Password Security Guidelines
Sponsored by: TechTargetIn this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
-
Mobile Security Solutions: Securing & Leveraging Mobile Devices
Sponsored by: Entrust, Inc.This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
-
Mobile: The Technology Game-Changer in 2013
Sponsored by: TechTarget SecurityTechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
-
Modernize Your Approach to Authentication
Sponsored by: TechTarget SecurityThis white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
-
Moving Beyond Ad Hoc Mobile Security
Sponsored by: TechTarget SecurityIs security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
-
Moving Past the Password? Not So Fast
Sponsored by: TechTarget SecurityThe password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
-
Multifactor authentication methods, use cases and products
Sponsored by: TechTarget SecurityMultifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
-
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
Sponsored by: VeriSign EMEAA multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
-
Network Access Control: User and Device Authentication
Sponsored by: Intel CorporationNetworking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
-
Next-Generation Authentication: Keys to Balancing Security and Convenience
Sponsored by: SafeNet Asia LtdThis white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
-
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
Oracle Mobile and Social Service: The Next Step in IAM
Sponsored by: Oracle Corporation UK LtdAs cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
-
Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
Sponsored by: ImprivataBy incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
-
Password Management Best Practices
Sponsored by: Hitachi ID Systems, Inc.This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
-
Password Management Project Roadmap
Sponsored by: Hitachi ID Systems, Inc.As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
-
Pick Your Identity Bridge
Sponsored by: Ping Identity CorporationThis resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
Sponsored by: ADTThis expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
Presentation Transcript: Changing Authentication Options
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
Sponsored by: IntelIn this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
-
Presentation Transcript: Effective and Secure User Account Provisioning
Sponsored by: Hitachi ID Systems, Inc.Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.
-
Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
Sponsored by: StrikeForce TechnologiesDiscover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.