July 12, 2013 - (Free Research) In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
February 2008 - (Free Research) This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.
March 2013 - (Free Research) In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
August 2011 - (Free Research) View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
June 2010 - (Free Research) This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
November 2004 - (Free Research) The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours.
April 2008 - (Free Research) This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
February 2013 - (Free Research) This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
December 2007 - (Free Research) An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation.
October 2008 - (Free Research) This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
March 2008 - (Free Research) This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
February 2012 - (Free Research) The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
July 2010 - (Free Research) Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
September 2008 - (Free Research) Passwords are an essential security technique. This white paper reviews best practices to password management and provides contrast methods of dealing with Enterprise Single Sign-On (ESSO) and describes an alternative approach to ESSO.
June 2013 - (Free Research) This expert cloud handbook presents the latest approaches to identity management in today's cloud and mobile IT era. Learn more about re-assessing your identity management strategy, how Windows Server 2012 enables Active Directory cloud deployments, SaaS tools for improved identity management and much more.
November 2012 - (Free Research) This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
September 2012 - (Free Research) Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
April 2014 - (Free Research) This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.