Password Management Research
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Build Your Identity And Access Management Strategy
Sponsored by: SymplifiedThis Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Contextual Authentication: A Multi-factor Approach
Sponsored by: PortalGuardThis informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
-
Two-factor Authentication: A Tokenless Approach
Sponsored by: PortalGuardLearn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
-
Enterprise Single Sign On
Sponsored by: tools4everWith organizations operating on variety of network and internet-based applications, users are often faced with complex passwords to gain access. However, this can lead to a number of issues such as user frustration, unsafe practices and higher costs. In this paper, explore the benefits of Enterprise SSO solutions and how they can meet your needs.
-
IT in Europe: Breaking the Code: Are passwords destined for obscurity?
Sponsored by: TechTarget ComputerWeekly.comThis feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
-
Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
Sponsored by: IntelIn today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
-
The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
Sponsored by: IntelCloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
-
Adaptive Strong Auth & Federated SSO - The New Power Couple
Sponsored by: IntelWeak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
-
Password Self Help – Password Reset for IBM i
Sponsored by: Safestone TechnologiesCheck out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
-
Implementing Database Security and Auditing - Authentication and Password Security
Sponsored by: IBMIn order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
-
Five tips to reduce risk from modern web threats
Sponsored by: SophosUser education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
-
Forrester Report: The Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationThis report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
-
E-Book: Technical Guide on Managing Identities and Access Control
Sponsored by: CA TechnologiesSearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Symantec 2010 SMB Information Protection Survey
Sponsored by: Symantec CorporationSmall and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.
-
RSA SecurID extension for the IBM System i
Sponsored by: Safestone TechnologiesWhite Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
-
Safe & Secure: An Overview of Security Features In JBoss Application Platforms
Sponsored by: Red HatSecurity is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
-
Password Management Best Practices
Sponsored by: Hitachi ID Systems, Inc.This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
-
Password Management Project Roadmap
Sponsored by: Hitachi ID Systems, Inc.As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
-
Defining Identity Management
Sponsored by: Hitachi ID Systems, Inc.This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
-
How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
Sponsored by: BeyondTrust CorporationThis white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
-
Improving Identity and Access Management in an SAP Environment
Sponsored by: Dell SoftwareIn this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple.
-
Managing Identities and Access Control
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.