March 21, 2013 - (Free Research) In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
February 2008 - (Free Research) This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.
April 2013 - (Free Research) In this valuable resource, discover how cloud security is not only the responsibility of the service provider, but the consumers themselves. Click now for 12 steps to follow to ensure secure cloud adoption.
February 2013 - (Free Research) This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
June 2010 - (Free Research) This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
August 2011 - (Free Research) View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
November 2004 - (Free Research) The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours.
April 2008 - (Free Research) This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
December 2007 - (Free Research) An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation.
October 2008 - (Free Research) This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
September 2008 - (Free Research) Passwords are an essential security technique. This white paper reviews best practices to password management and provides contrast methods of dealing with Enterprise Single Sign-On (ESSO) and describes an alternative approach to ESSO.
February 2012 - (Free Research) The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
July 2010 - (Free Research) Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
July 2012 - (Free Research) While API management might be an old concept, cloud-based API management presents a new discipline with added security, visibility, integration, and scale requirements. View now to learn more.
September 2009 - (Free Research) This document describes the basic concepts and integration guidelines for FalconStor® File-interface Deduplication System (FDS) in a Veritas NetBackup™ environment. It is intended to provide best practices for configuring all components.
March 2008 - (Free Research) This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
June 2013 - (Free Research) This expert cloud handbook presents the latest approaches to identity management in today's cloud and mobile IT era. Learn more about re-assessing your identity management strategy, how Windows Server 2012 enables Active Directory cloud deployments, SaaS tools for improved identity management and much more.
May 2011 - (Free Research) In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.