February 2008 - (Free Research) This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.
March 2013 - (Free Research) This case study examines how Johns Hopkins Hospital implemented single sign-on technology to improve access to clinical applications while eliminating password confusion and time-wasting – all while meeting HIPAA requirements for access and authentication. Read now to learn how they did it.
March 2013 - (Free Research) In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
September 2009 - (Free Research) This document describes the basic concepts and integration guidelines for FalconStor® File-interface Deduplication System (FDS) in a Veritas NetBackup™ environment. It is intended to provide best practices for configuring all components.
June 2010 - (Free Research) This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
August 2011 - (Free Research) View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
November 2004 - (Free Research) The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours.
April 2008 - (Free Research) This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
February 2013 - (Free Research) This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
October 2008 - (Free Research) This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
December 2007 - (Free Research) An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation.
September 2008 - (Free Research) Passwords are an essential security technique. This white paper reviews best practices to password management and provides contrast methods of dealing with Enterprise Single Sign-On (ESSO) and describes an alternative approach to ESSO.
March 2008 - (Free Research) This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
February 2012 - (Free Research) The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
July 2010 - (Free Research) Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
July 2012 - (Free Research) While API management might be an old concept, cloud-based API management presents a new discipline with added security, visibility, integration, and scale requirements. View now to learn more.
August 2009 - (Free Research) This document describes the basic concepts and integration guidelines for FalconStor FDS in an EMC NetWorker environment. The document is intended to provide an architectural overview of FalconStor FDS being used with EMC NetWorker and the benefits of a combined solution.
October 2013 - (Free Research) For the 8th consecutive year, Information Security readers voted to determine the best security products. More than 1,000 voters participated in our Readers' Choice Awards 2013.
June 2013 - (Free Research) This expert cloud handbook presents the latest approaches to identity management in today's cloud and mobile IT era. Learn more about re-assessing your identity management strategy, how Windows Server 2012 enables Active Directory cloud deployments, SaaS tools for improved identity management and much more.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.