Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 16 results from our White Paper Library

Sort By
Quest Software

Identity Management

White Paper: Simplify Your Approach to Identity and Access...

See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....


IBM

Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.


Imation

Authentication

Securing USB Flash Drives with Biometric Authentication...

The small size, low cost and large storage capacities of USB flash drives makes them a large security risk. Discover why biometric authentication offers...


PowerTech

Regulatory Compliance

The State of IBM i Security Study 2012

Download the2012 study to learn where your system is vulnerable and how you can protect it.


Quest Software

Risk

Privileged Password Sharing: the "Root" of All Evil

How can one administrator, or even a team, provision and keep track of every privileged user on every system and on which server, and to what end? This...


Quest Software

Password Management

The Importance of Managing Privileged Accounts

This paper explains how to use, and avoid mis-using, Privileged Accounts, and how enabling granular access control and accountability helps mitigate management...


Okta

Password Management

Okta Active Directory Integration - An Architecture Overview...

Read this whitepaper to learn how Okta eliminates the pitfalls that come with trying to build and manage multiple onpremises AD integrations yourself....


Okta

Identity Management

Top 8 Identity & Access Management Challenges with Your...

This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications,...


EMC Corporation

Password Management

An Overview and Competitive Analysis of the One-Time Password...

Labeled “The Year of the Security Breach,” 2011 was witness to a series of significant high-profile security breaches. Security is important. Discover...


Appsense

Security

Reducing user logon times: Increasing user productivity...

How long are your logon times? Just a 3 minute logon time can cost an organization $800 and 30 hours of lost productivity per user. Find out how to reduce...


Previous 1
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Does sealed hardware stifle innovation?