Authentication Research
-
The Threat Within: The Case for Zero Trust Access Control
Sponsored by: XceediumIt's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
-
Enterprise Single Sign On
Sponsored by: tools4everWith organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
-
Simplify SSL Certificate Management Across the Enterprise
Sponsored by: Symantec CorporationManaging SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
-
Simplifying and Securing Group Policy Management
Sponsored by: Dell SoftwareDiscover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
-
Applications and best practices to keep your mobile devices secure
Sponsored by: TechTarget SecurityUncover best practices for keeping your mobile devices and applications secure.
-
Protecting Corporate Data in the "BYOD" Environment
Sponsored by: Apperian, Inc.While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
-
Best Practices for mobile authentication
Sponsored by: TechTarget SecurityAccess this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
-
Presentation Transcript:From Wow to How 2: Virtual Desktops, Networking and the Cloud
Sponsored by: Citrix and MicrosoftLearn about the various capabilities of virtual desktops beyond just VDI. Discover what role cloud computing plays in today’s enterprises and find out how to authorize desktop users from a single point of authentication.
-
Understanding, Building and Securing an IAM Cloud Architecture
Sponsored by: OneLoginThis presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.
-
Securing Network Access for Guests and Contractors
Sponsored by: Bradford NetworksThis whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
-
Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
Sponsored by: StrikeForce TechnologiesDiscover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
-
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
Sponsored by: TechTarget ComputerWeekly.comThis feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
-
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
Sponsored by: VeriSign EMEAThis guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
-
Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
Sponsored by: IntelIn today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
-
The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
Sponsored by: IntelCloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
-
Adaptive Strong Auth & Federated SSO - The New Power Couple
Sponsored by: IntelWeak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
-
E-Guide: Are 'strong authentication' methods strong enough for compliance?
Sponsored by: TechTarget SecurityAlthough strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
-
Securing the enterprise application layer: Expert Guidelines
Sponsored by: TechTarget SecurityIf you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation. Find out how securing a naming and directory service will help build a solid platform that application can trust.
-
The Token is Dead. Long Live the Token
Sponsored by: SafeNet, Inc.View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
-
Securely Publish and Manage Web APIs with CloudControl
Sponsored by: Layer 7 TechnologiesCloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
E-Guide: Preventing and detecting security vulnerabilities in Web applications
Sponsored by: TechTarget SecurityThe extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
-
GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations
Sponsored by: GlobalscapeIn this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.
-
Building the Right Mobile Security Toolkit
Sponsored by: TechTarget SecurityDue to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.