Remote Authentication Reports

Computer Weekly – 5 March 2024: Authorised access only – biometrics in the workplace
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.
Posted: 04 Mar 2024 | Published: 05 Mar 2024

TechTarget ComputerWeekly.com

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

How IAM has Evolved on the Cloud: The Good and the Bad
sponsored by IBM
EGUIDE: Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
Posted: 15 Feb 2017 | Published: 14 Feb 2017

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ