PAP Reports

5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.

Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008

PistolStar, Inc.

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
sponsored by Intel
PRESENTATION TRANSCRIPT: User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
Posted: 20 May 2011 | Published: 20 May 2011

Intel