Password Authentication Protocol White Papers
-
6 user authentication types to secure networks
Sponsored by: TechTarget ComputerWeekly.comThe goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
5 types of data security
Sponsored by: TechTarget ComputerWeekly.comBecause no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
-
Password Security Essentials & Envisioning a Passwordless Future
Sponsored by: Beta SystemsHow secure are OTPs? And if passwords are so insecure, why are we still using them? Access this custom e-guide to confront the challenges of password security and shore up your strategy.
-
Take Control of Virtual Desktop Access with Two-Factor Authentication
Sponsored by: CitrixIn this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
-
Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
Sponsored by: RSA SoftcatMultifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: UnitedLexWhile global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
How to Properly Move into the Cloud
Sponsored by: Forum SystemsThis e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
-
A Guide to Password Use in WebSphere Application Server
Sponsored by: Global KnowledgeLearn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
-
The Five-Step Guide to Better Social Media Security
Sponsored by: HootsuiteAccess this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
-
Manage with ease: Get peace of mind with HP and Windows Embedded
Sponsored by: Hewlett Packard EnterpriseIn this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
-
Hot Tips for Securing Your Wireless Network
Sponsored by: SophosEveryone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
-
Contextual Authentication: A Multi-factor Approach
Sponsored by: PortalGuardThis informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
Sponsored by: IntelUser provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Â Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Password Management Best Practices
Sponsored by: Hitachi ID Systems, Inc.This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
-
Password Management Project Roadmap
Sponsored by: Hitachi ID Systems, Inc.As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
-
Defining Identity Management
Sponsored by: Hitachi ID Systems, Inc.This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
-
Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
Sponsored by: Dell SoftwareThis tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
-
Authentication in the Enterprise: Current and Changing Requirements
Sponsored by: PistolStar, Inc.This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
-
Developers and Identity Services - Tackling Identity Data with Identity Hub
Sponsored by: Oracle CorporationThis paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
-
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
Sponsored by: Oracle CorporationThis paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
-
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Sponsored by: PistolStar, Inc.This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.