Authentication Research
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: TechTarget SecurityErrors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: TechTarget SecurityExpert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
-
SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS
Sponsored by: TechTarget SecurityThis expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
Bloomberg Personal Vault
Sponsored by: BloombergAccess this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
-
As data grows, so do the risks: How to improve data and app sec
Sponsored by: IBMAccess this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Securing Access to the Office 365 Cloud with Two Factor Authentication
Sponsored by: Data3Secure access is a major concern when utilizing cloud-based Office 365, especially since today's users will be logging in from on and off-premises locations. This whitepaper details a 2 factor authentication process with convenient single sign on (SSO) for improved user experience and security.
-
Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
Sponsored by: Hewlett-Packard EnterpriseThis exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
-
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
Sponsored by: Symantec CorporationSearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
-
SSL Certificate Management: Avoiding Common Mistakes
Sponsored by: Symantec CorporationThis expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
-
Website Security Threat Report, Part Two
Sponsored by: Symantec CorporationThis website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: Symantec CorporationWeb security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
-
Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
Sponsored by: GeoTrust, Inc.This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
-
Why Switch to Thawte?
Sponsored by: Thawte Inc.This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
Sponsored by: ADTThis expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Manage with ease: Get peace of mind with HP and Windows Embedded
Sponsored by: Hewlett Packard EnterpriseIn this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Sponsored by: Dell SecureWorksUncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
-
Hot Tips for Securing Your Wireless Network
Sponsored by: SophosEveryone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
-
Threat Prevention Techniques: Best Practices for Threat Management
Sponsored by: GeoTrust, Inc.SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.