Your Search returned 1 results from our Editorial content

Sort By

SECURITY

The new age of “visual” security

Why password protection needs to evolve with consumer behaviour

   

Your Search returned 22 results from our White Paper Library

Sort By
Quest Software

Identity Management

Simplify Your Approach to Identity and Access Management...

See how the Quest One Identity Solution addresses the challenges that arise in heterogeneous environments, and how Quest can help you meet these challenges....


IBM

Database Administration

“Account Security” Chapter from HOWTO Secure and Audit Oracle...

Account security is one of the fundamental building blocks in ensuring a secure Oracle environment.


Imation

Authentication

Securing USB Flash Drives with Biometric Authentication...

The small size, low cost and large storage capacities of USB flash drives makes them a large security risk. Discover why biometric authentication offers...


PowerTech

Regulatory Compliance

The State of IBM i Security Study 2012

Download the2012 study to learn where your system is vulnerable and how you can protect it.


Quest Software

Risk

Privileged Password Sharing: the "Root" of All Evil

How can one administrator, or even a team, provision and keep track of every privileged user on every system and on which server, and to what end? This...


Quest Software

Password Management

The Importance of Managing Privileged Accounts

This paper explains how to use, and avoid mis-using, Privileged Accounts, and how enabling granular access control and accountability helps mitigate management...


EMC Corporation

Password Management

An Overview and Competitive Analysis of the One-Time Password...

Labeled “The Year of the Security Breach,” 2011 was witness to a series of significant high-profile security breaches. Security is important. Discover...


Blue Coat

Security

Security Empowers Business: Unlock The Power Of A Protected...

This white paper describes a new model of security that focuses on empowerment –mitigating security risks and threats without constraining people or stifling...


OneLogin

Identity Management

12 Questions You Must Ask Your Cloud SSO IAM Vendor

This paper reveals 12 questions you must ask your cloud SSO IAM vendor.


Cyber-Ark Software

Password Management

The Three Phases of Securing Privileged Accounts: A Best...

This paper provides explanations for the various options organizations have when securing privileged accounts.


Previous 1 3

Blogs

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems
  • /view_company_report/2274/silverpeak

Poll

Do you think undersea data centers are a good idea?