authentication

Results 176 - 200 of 341Sort Results By: Published Date | Title | Company Name
Published By: Kaseya     Published Date: Nov 12, 2014
While there are an innumerable number of ways you could improve your businessís information security posture, for the sake of brevity letís shorten that list to the methods which often provide great benefits. Here are five ways that you can help your business reduce the chance of being victimized by cybercrime.
Tags : 
kaseya, cybercrime, reduce risk, cyber attacks, audits, authentication, security, automation, business intelligence, secure content management
    
Kaseya
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud, identity management, internet security, intrusion detection, intrusion prevention, security policies
    
LifeLock
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. Call me to learn about the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, security, identity threat, authentication, it security, access control, identity management, intrusion detection, intrusion prevention, security policies
    
LifeLock
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh, security, internet security, single sign on
    
Likewise Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : 
likewise, risk, compliance, sox, security
    
Likewise Software
Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management, virtualization, cloud computing, infrastructure
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companiesí most valuable information assets, but in most cases theyíre poorly protected. Itís important to secure databases as well as or better than other systems in the enterprise. But itís not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam, anti spyware, anti virus, ddos, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management
    
McAfee
Published By: Message Systems     Published Date: Mar 07, 2013
A hundred a day? A thousand a day? More? Believe it or not, many organizations send several million emails a day, and enterprises, large online retailers, social networks and gaming sites often send as much as a billion a month.
Tags : 
high volume email, email marketing, sending reputation, email authentication, email infrastructure, email software
    
Message Systems
Published By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIronís layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Appleís Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in todayís mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: ē Establish user trust using multiple factor authentication ē Correlate user trust with other factors such as endpoint, app, network, and more ē Apply adaptive, risk-based policies that match the userís environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoCrypto is one of the smallest, fastest, and most complete cryptography engines designed for embedded systems. Download the NanoCrypto whitepaper and receive a free trial.
Tags : 
mocana, nano crypto, embedded device, security authentication, cryptography engine, authentication, encryption, system on a chip, embedded systems and networking, integrated circuits and semiconductors
    
Mocana
Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology, data protection
    
Motorola
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec, ssl, central management, remote access, network security, next generation, authentication, security management
    
NCP Engineering GmbH
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Forresterís solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
Recently, industry analysts have focused on new authentication methods; however, maybe passwords arenít dead. In todayís world, passwords are still a big part of life but resetting them still drains the life from IT productivity. Slay that monster.
Tags : 
netiq, passwords, enterprise security, username, password, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
As security threats continue to rise with online authentication, your organization must rise to the challenge, as usernames and passwords just donít cut it.
Tags : 
    
NETIQ
Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix, password management
    
Netwrix
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login, access control
    
Netwrix
Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects, local area networking, network security, 802.11, wireless security
    
Nevis Networks
Published By: Okiok     Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Tags : 
single sign on, sso, sso deployment, single sign on deployment, authentication, identity management, okiok, security management, security policies
    
Okiok
Published By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password, access control, application security, email security, encryption, firewalls, intrusion detection, intrusion prevention, password management, ssl, application integration, application performance management
    
Okta
Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password, access control, application security, business continuity, compliance, ddos, disaster recovery, email security, internet security, intrusion detection, intrusion prevention, ipsec
    
Okta
Published By: Okta     Published Date: Jan 30, 2013
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's MFA solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : 
okta, multifactor, authentication, user names, passwords, beyond users, okta multifactor authentication, security, knowledge management, data management, data center
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.