Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 21 results from our White Paper Library

Sort By
Quest Software

Identity Management

Simplify Your Approach to Identity and Access Management...

See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....


Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.



Securing USB Flash Drives with Biometric Authentication...

The small size, low cost and large storage capacities of USB flash drives makes them a large security risk. Discover why biometric authentication offers...


Regulatory Compliance

The State of IBM i Security Study 2012

Download the2012 study to learn where your system is vulnerable and how you can protect it.

Quest Software


Privileged Password Sharing: the "Root" of All Evil

How can one administrator, or even a team, provision and keep track of every privileged user on every system and on which server, and to what end? This...

Quest Software

Password Management

The Importance of Managing Privileged Accounts

This paper explains how to use, and avoid mis-using, Privileged Accounts, and how enabling granular access control and accountability helps mitigate management...

EMC Corporation

Password Management

An Overview and Competitive Analysis of the One-Time Password...

Labeled “The Year of the Security Breach,” 2011 was witness to a series of significant high-profile security breaches. Security is important. Discover...



Reducing user logon times: Increasing user productivity...

How long are your logon times? Just a 3 minute logon time can cost an organization $800 and 30 hours of lost productivity per user. Find out how to reduce...

Blue Coat


Security Empowers Business: Unlock The Power Of A Protected...

This white paper describes a new model of security that focuses on empowerment –mitigating security risks and threats without constraining people or stifling...


Identity Management

12 Questions You Must Ask Your Cloud SSO IAM Vendor

This paper reveals 12 questions you must ask your cloud SSO IAM vendor.

Previous 1 3

Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?