Authentication Research
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
Sponsored by: IntelIn this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
-
Implementing Database Security and Auditing - Authentication and Password Security
Sponsored by: IBMIn order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
-
Simplifying management and lowering total cost of ownership for SSL certificates
Sponsored by: GlobalSignThis white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
Sponsored by: IntelTraditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
-
Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
Sponsored by: ImprivataThis whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
-
Adaptive Access Management: An ROI Study
Sponsored by: Oracle CorporationSecurity solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
-
Simplify Security for REST and WS* Web Services: The Gateway Approach
Sponsored by: IntelThis solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
-
Presentation Transcript: Changing Authentication Options
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
Presentation Transcript: Risk Mitigation – Bang for the Buck
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
End-to-End Secure Client to Cloud Access
Sponsored by: IntelIn this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
-
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
Sponsored by: Radiant Logic, Inc.This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
-
Solution Summary - Secure Cloud
Sponsored by: Radiant Logic, Inc.This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
-
E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA
Sponsored by: IBMIn this issue of SearchSoftwareQuality.com's Software Testing e-zine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.
-
RSA SecurID extension for the IBM System i
Sponsored by: Safestone TechnologiesWhite Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
Trusted Computing: Establishing Device Authentication
Sponsored by: Wave Systems Corp.View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
-
Sentinel Log Manager Review
Sponsored by: Novell, Inc.This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.
-
Presentation Transcript: Effective and Secure User Account Provisioning
Sponsored by: Hitachi ID Systems, Inc.Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet, Inc.This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
-
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
Sponsored by: Dell SoftwareLearn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
-
Password Management Best Practices
Sponsored by: Hitachi ID Systems, Inc.This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
-
Password Management Project Roadmap
Sponsored by: Hitachi ID Systems, Inc.As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.