ComputerWeekly.com Research Library

Powered by Bitpipe.com

Authentication Research

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: TechTarget Security

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

  • BYOPC Strategy: Policies and Problem Solving

    Sponsored by: TechTarget Security

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • A Guide to MAM and Planning for BYOD Security in the Enterprise

    Sponsored by: TechTarget Security

    In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.

  • Guide to Mobile Device Management Software

    Sponsored by: TechTarget Security

    This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • Complete and Scalable Access Management

    Sponsored by: Oracle Corporation UK Ltd

    This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Oracle Mobile and Social Service: The Next Step in IAM

    Sponsored by: Oracle Corporation UK Ltd

    As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: GeoTrust, Inc.

    This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!

  • ISM December 2012

    Sponsored by: TechTarget Security

    In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  • The Benefits of Next-Generation Virtual ADCs

    Sponsored by: Citrix Systems, Inc.

    Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing.

  • Recommended Best Security Practices for Unified Communications

    Sponsored by: Polycom, Inc.

    Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • Contextual Authentication: A Multi-factor Approach

    Sponsored by: PortalGuard

    This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.

  • Two-factor Authentication: A Tokenless Approach

    Sponsored by: PortalGuard

    Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.

  • The Expanding Network Perimeter: How to Protect it With Unified Threat Management

    Sponsored by: Sophos

    Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • Modernize Your Approach to Authentication

    Sponsored by: TechTarget Security

    This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.

  • Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely

    Sponsored by: Cisco

    Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.

  • Mobile Security Solutions: Securing & Leveraging Mobile Devices

    Sponsored by: Entrust, Inc.

    This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.

  • IT Security: Built-In Protection with Intel vPro Technology

    Sponsored by: Intel

    New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.

  • Enabling High Performance for Apple iPads in the Enterprise

    Sponsored by: Aruba Networks

    Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.