AAA Research
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
Sponsored by: TechTarget SecurityThis eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
eBook: Software as a Service: What You Should Consider When Moving to SaaS
Sponsored by: TechTarget SecurityCheck out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
EMBASSY Remote Administration Server (ERAS)
Sponsored by: Wave Systems Corp.Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives.
-
Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
Sponsored by: SafeNet Asia LtdIn this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
-
EMC Documentum Information Rights Management
Sponsored by: EMC CorporationThis White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
-
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
Sponsored by: EMC & ArrowThis Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
-
EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
Sponsored by: RainStor Inc.Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
-
Enabling High Performance for Apple iPads in the Enterprise
Sponsored by: Aruba NetworksLearn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
-
End-to-End Secure Client to Cloud Access
Sponsored by: IntelIn this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
-
Enterprise Single Sign On
Sponsored by: tools4everWith organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
-
Enterprise-Grade Wireless LAN Security
Sponsored by: SiemensThis white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
-
ESIGN Act A Well-Established Law Enabling Business Transformation Today
Sponsored by: Adobe EchoSignThis paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
-
Evaluating File Sync and Share Security
Sponsored by: Dropbox for BusinessThis white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
-
Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
Sponsored by: Radiant Logic, Inc.Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: Symantec CorporationWeb security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
-
Facilitating Enterprise PCI DSS Compliance - Executive Summary
Sponsored by: GlobalscapeThe GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
-
Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
Sponsored by: ImprivataThis whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
-
Fixing the "Everyone" Problem
Sponsored by: VaronisRead this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
-
For Secure Access, Passwords Alone Do Not Work
Sponsored by: VerizonThis informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
-
Get Ready for Master Data Management: Ten Things You Can Do Now
Sponsored by: KalidoThis paper explians in detail ten things you can do now to prepare for your master data management initiative.
-
Getting Started with Cloud IAM Services
Sponsored by: OneLoginIn this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations
Sponsored by: GlobalscapeIn this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.