Password Management White Papers
-
Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
The ultimate guide to identity & access management
Sponsored by: TechTarget ComputerWeekly.comBusinesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
-
Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
Sponsored by: Bradford NetworksLearn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
-
Total Economic Impact of Oracle Identity Manager
Sponsored by: Oracle CorporationOracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Implementing an identity management solution
Sponsored by: SAP America, Inc.This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
-
The Role of Password Management in Achieving Compliance
Sponsored by: PistolStar, Inc.This paper will look at the dramatic impact password management solutions have had on organizations.
-
The Evolution of Password Authentication and Management: A Simple Solution
Sponsored by: PistolStar, Inc.This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations.
-
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Sponsored by: PistolStar, Inc.This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
-
Eliminating Notes ID File Password Management: A Ground-breaking Alternative
Sponsored by: PistolStar, Inc.Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.