Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 17 results from our White Paper Library

Sort By
OneLogin

Identity Management

12 Questions You Must Ask Your Cloud SSO IAM Vendor

This paper reveals 12 questions you must ask your cloud SSO IAM vendor.


Blue Coat

Security

Security Empowers Business: Unlock The Power Of A Protected...

This white paper describes a new model of security that focuses on empowerment –mitigating security risks and threats without constraining people or stifling...


Okta

Password Management

Okta Active Directory Integration - An Architecture Overview...

Read this whitepaper to learn how Okta eliminates the pitfalls that come with trying to build and manage multiple onpremises AD integrations yourself....


EMC Corporation

Password Management

An Overview and Competitive Analysis of the One-Time Password...

Labeled “The Year of the Security Breach,” 2011 was witness to a series of significant high-profile security breaches. Security is important. Discover...


Appsense

Security

Reducing user logon times: Increasing user productivity...

How long are your logon times? Just a 3 minute logon time can cost an organization $800 and 30 hours of lost productivity per user. Find out how to reduce...


PowerTech

Regulatory Compliance

The State of IBM i Security Study 2012

Download the2012 study to learn where your system is vulnerable and how you can protect it.


Quest Software

Risk

Privileged Password Sharing: the "Root" of All Evil

How can one administrator, or even a team, provision and keep track of every privileged user on every system and on which server, and to what end? This...


Okta

Identity Management

Top 8 Identity & Access Management Challenges with Your...

This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications,...


Quest Software

Password Management

The Importance of Managing Privileged Accounts

This paper explains how to use, and avoid mis-using, Privileged Accounts, and how enabling granular access control and accountability helps mitigate management...


Imation

Authentication

Securing USB Flash Drives with Biometric Authentication...

The small size, low cost and large storage capacities of USB flash drives makes them a large security risk. Discover why biometric authentication offers...


Previous 1

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?