Authorization Research
-
Information Security – May 2014
Sponsored by: TechTarget SecurityThe online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
-
A Guide to Password Use in WebSphere Application Server
Sponsored by: Global KnowledgeLearn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Consumer Web Portals: Platforms at Significant Security Risk
Sponsored by: EMC CorporationThis profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
Pick Your Identity Bridge
Sponsored by: Ping Identity CorporationThis resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
Sponsored by: Celestix NetworksThis guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
2014 Magic Quadrant for User Authentication
Sponsored by: SafeNet Asia LtdView this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
-
Next-Generation Authentication: Keys to Balancing Security and Convenience
Sponsored by: SafeNet Asia LtdThis white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet Asia LtdIn this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
-
Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
Sponsored by: SafeNet Asia LtdIn this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
-
Securing and Controlling Sensitive Data in the Cloud
Sponsored by: Trend MicroThis white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
For Secure Access, Passwords Alone Do Not Work
Sponsored by: VerizonThis informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
Bloomberg Personal Vault
Sponsored by: BloombergAccess this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.