AAA Research
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Presentation Transcript: Risk Mitigation – Bang for the Buck
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
Presentation Transcript:From Wow to How 2: Virtual Desktops, Networking and the Cloud
Sponsored by: Citrix and MicrosoftLearn about the various capabilities of virtual desktops beyond just VDI. Discover what role cloud computing plays in today’s enterprises and find out how to authorize desktop users from a single point of authentication.
-
Prevent Fraud and Improve the User Experience with Mobile Access Management
Sponsored by: IBMThis white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
-
Protect Your Customer Data for Peace of Mind
Sponsored by: Cisco Systems, Inc.When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Protecting Corporate Data in the "BYOD" Environment
Sponsored by: Apperian, Inc.While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
Recommended Best Security Practices for Unified Communications
Sponsored by: Polycom, Inc.Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
-
Role Based Access Control and Entitlement Management
Sponsored by: FoxTThe new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
-
RSA SecurID extension for the IBM System i
Sponsored by: Safestone TechnologiesWhite Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
Sponsored by: SAP America, Inc.This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
-
SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know
Sponsored by: IBMToo many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS
Sponsored by: TechTarget SecurityThis expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: TechTarget SecurityExpert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
-
Securely Publish and Manage Web APIs with CloudControl
Sponsored by: Layer 7 TechnologiesCloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.
-
Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
Sponsored by: Celestix NetworksThis guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
-
Securing Access to the Office 365 Cloud with Two Factor Authentication
Sponsored by: Data3Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
-
Securing and Controlling Sensitive Data in the Cloud
Sponsored by: Trend MicroThis white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
-
Securing and Managing Your Enterprise: An Integrated Approach
Sponsored by: Novell, Inc.Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell®
-
Securing content and access with smart management techniques
Sponsored by: TechTarget Content ManagementWhen it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.