Authorization Research
-
Building an Unstructured Data Protection Program
Sponsored by: STEALTHbitsIn this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
-
Why So Many Enterprises Lack Proper Authentication Methods
Sponsored by: RSA SoftcatSingle-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
-
Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
Sponsored by: RSA SoftcatMultifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
What to Look for in Multifactor Authentication Tools
Sponsored by: TechTarget SecurityIn our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
Sponsored by: Adobe EchoSignMany companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
-
Speed Up Your Business with E-Signatures
Sponsored by: Adobe EchoSignThis white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
-
ESIGN Act A Well-Established Law Enabling Business Transformation Today
Sponsored by: Adobe EchoSignThis paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
How to Properly Move into the Cloud
Sponsored by: Forum SystemsThis e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
ActivID® Authentication Appliance for Enterprise
Sponsored by: HID GlobalIn this brochure, discover a solution that puts an end to your identity and authentication worries.
-
Security best practices for file-based data movement— an IT practitioner’s guide
Sponsored by: IBMIn this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
Evaluating File Sync and Share Security
Sponsored by: Dropbox for BusinessThis white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.