Passwords Research
-
Consumerization 101: Defining & Enforcing a Successful BYOD Policy
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
-
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
Sponsored by: TechTarget SecurityBYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
-
MDM Software: Benefits of Mobile Configuration Management
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
-
A Guide to MAM and Planning for BYOD Security in the Enterprise
Sponsored by: TechTarget SecurityIn this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
-
October Essentials Guide on Mobile Device Security
Sponsored by: TechTarget SecurityThe October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
-
Enterprise Mobile Device Security Best Practices
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.
-
The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
Sponsored by: TechTarget SecurityDespite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
-
Best Practices for mobile authentication
Sponsored by: TechTarget SecurityAccess this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
-
Building An Intelligence - Driven Security Operations Center
Sponsored by: EMC CorporationAccess this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
Sponsored by: ADTThis expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
-
Hot Tips for Securing Your Wireless Network
Sponsored by: SophosEveryone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Two-factor Authentication: A Tokenless Approach
Sponsored by: PortalGuardLearn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
-
The Ten "Must Haves" for Secure Mobile Device Management
Sponsored by: ZenpriseUncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications.
-
Sophos Security Threat Report 2011
Sponsored by: SophosLet our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
-
Presentation Transcript: Effective and Secure User Account Provisioning
Sponsored by: Hitachi ID Systems, Inc.Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.
-
Password Management Best Practices
Sponsored by: Hitachi ID Systems, Inc.This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
-
Password Management Project Roadmap
Sponsored by: Hitachi ID Systems, Inc.As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: IBMThis paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
Sponsored by: Bradford NetworksLearn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
-
VMware: "The top ten most forgotten things when building a disaster recovery plan"
Sponsored by: VMware, Inc.Every IT manager knows the importance of having an effective and fast disaster recovery (DR) plan. Organizations without an adequate plan may find themselves out of business quickly after experiencing a major disaster. Organizations that ensure survival..
-
The Top 12 Most Difficult Active Directory Management Tasks
Sponsored by: Dell SoftwareThis paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.