Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 28 results from our White Paper Library

Sort By
Quest Software

Identity Management

White Paper: Simplify Your Approach to Identity and Access...

See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....


Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.



Securing USB Flash Drives with Biometric Authentication...

The small size, low cost and large storage capacities of USB flash drives makes them a large security risk. Discover why biometric authentication offers...


Regulatory Compliance

The State of IBM i Security Study 2012

Download the2012 study to learn where your system is vulnerable and how you can protect it.

Quest Software


Privileged Password Sharing: the "Root" of All Evil

How can one administrator, or even a team, provision and keep track of every privileged user on every system and on which server, and to what end? This...

Quest Software

Password Management

The Importance of Managing Privileged Accounts

This paper explains how to use, and avoid mis-using, Privileged Accounts, and how enabling granular access control and accountability helps mitigate management...


Password Management

Okta Active Directory Integration - An Architecture Overview...

Read this whitepaper to learn how Okta eliminates the pitfalls that come with trying to build and manage multiple onpremises AD integrations yourself....


Identity Management

Top 8 Identity & Access Management Challenges with Your...

This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications,...

EMC Corporation

Password Management

An Overview and Competitive Analysis of the One-Time Password...

Labeled “The Year of the Security Breach,” 2011 was witness to a series of significant high-profile security breaches. Security is important. Discover...



Reducing user logon times: Increasing user productivity...

How long are your logon times? Just a 3 minute logon time can cost an organization $800 and 30 hours of lost productivity per user. Find out how to reduce...

Previous 1 3

Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/213/brocade
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk


Is re-introducing the BBC microbit a good way to encourage kids into tech?”