Your Search returned 21 results from our White Paper Library

Sort By
Centrify

IT Compliance

Becoming PCI DSS Compliant: 10 Key Security Requirements...

This white paper examines each of the 12 requirements of PCI DSS 3.


Centrify

Mobile Device Management

Modern Enterprise Management for Mac and Mobile Devices...

This paper addresses how Centrify can help companies that don’t want to use Microsoft on-premises management infrastructure and would rather leverage the...


Centrify

Identity Management

Top Six Things to Consider with an Identity-as-a-Service...

This paper discusses the top six things to consider when exploring Identity-as-a-Service (IDaaS) Solutions.


Securing Enterprise Identities for Dummies

Threat and Vulnerability Management

Securing Enterprise Identities for Dummies

Find out how to secure your identities against cyber threats.


Centrify

Threat and Vulnerability Management

Securing Enterprise Identities for Dummies

Find out how to secure your identities against cyber threats.


Centrify

Access Control

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


Centrify

Threat and Vulnerability Management

Securing Enterprise Identities for Dummies

Find out how to secure your identities against cyber threats.


Centrify

Access Control

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


Centrify

Threat and Vulnerability Management

Securing Enterprise Identities for Dummies

Find out how to secure your identities against cyber threats.


Centrify

Access Control

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


Previous 1 3

Recommended for You

dan2

Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?