Authentication Research
-
Keeping up to Date with your Organization's Threat and Authentication Techniques
Sponsored by: TechTarget SecurityEnterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Consumer Web Portals: Platforms at Significant Security Risk
Sponsored by: EMC CorporationThis profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
Sponsored by: TechTarget CIOPrescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.
-
Internet-Scale Identity Systems:An Overview and Comparison
Sponsored by: Ping Identity CorporationThis white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
-
Pick Your Identity Bridge
Sponsored by: Ping Identity CorporationThis resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
Sponsored by: EMC & ArrowThis Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
-
Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
Sponsored by: Celestix NetworksThis guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
TWO-FACTOR AUTHENTICATION OPTIONS, USE CASES AND BEST PRACTICES
Sponsored by: Celestix NetworksThis expert e-guide is a pivotal resource to understand how to best use two-factor authentication security options. Single-factor password-based authentication systems are doomed to fail, so read on with the experts to learn the best practices to protect your business.
-
Strategies for Enhancing the Clinician’s Workstation Productivity
Sponsored by: SiemensAccess this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
-
2014 Magic Quadrant for User Authentication
Sponsored by: SafeNet Asia LtdView this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
-
Next-Generation Authentication: Keys to Balancing Security and Convenience
Sponsored by: SafeNet Asia LtdThis white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet Asia LtdIn this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
-
Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
Sponsored by: SafeNet Asia LtdIn this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
-
Securing and Controlling Sensitive Data in the Cloud
Sponsored by: Trend MicroThis white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
For Secure Access, Passwords Alone Do Not Work
Sponsored by: VerizonThis informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.