Authentication Research
-
Defining Identity Management
Sponsored by: Hitachi ID Systems, Inc.This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
-
How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
Sponsored by: BeyondTrust CorporationThis white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Securing and Managing Your Enterprise: An Integrated Approach
Sponsored by: Novell, Inc.Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell®
-
SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
Sponsored by: TechTarget Search Windows ServerHaving some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
-
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
-
Role Based Access Control and Entitlement Management
Sponsored by: FoxTThe new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
-
Information Security Magazine - September 2009: Readers’ Choice Awards
Sponsored by: Information Security MagazineThis issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
-
Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
Sponsored by: CDW CorporationTaking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA
Sponsored by: TechTarget Software QualityIn this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.
-
802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
Sponsored by: Juniper Networks, Inc.This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
-
7 Things Every System Administrator Should Know about OpenSSH
Sponsored by: Global KnowledgeThis paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
-
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
Sponsored by: TechTarget Mobile ComputingStructured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
Sponsored by: VeriSign EMEAA multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
-
eBook: Software as a Service: What You Should Consider When Moving to SaaS
Sponsored by: TechTarget SecurityCheck out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
Sponsored by: TechTarget SecurityThis eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
Wireless Networking: Five Questions to Start With
Sponsored by: Cisco Systems, Inc.This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Cisco Aironet 1300 Series Outdoor Access Point/Bridge
Sponsored by: Cisco Systems, Inc.The Cisco® Aironet® 1300 Series Outdoor Access Point or Bridge is an 802.11g access point and bridge that provides high-speed and cost-effective wireless connectivity between multiple fixed or mobile networks and clients.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.