Security Infrastructure White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Design and Development  >  

Security Infrastructure

MORE SPECIFIC TOPICS:  Public Key Infrastructure
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 604 Matches
Predictions 2014: Identity and Access Management
sponsored by IBM
Analyst Report: | Posted: 17 Apr 2014
Published:26 Nov 2013
Summary:This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Get This Now
IBM

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Get This Now
Cisco Systems, Inc.

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
Analyst Report: | Posted: 17 Apr 2014
Published:31 Aug 2013
Summary:This Ponemon Institute report sheds light on which level of complexity is best for an effective, yet easy-to-manage identity and access management (IAM) program.
Get This Now
RSA, The Security Division of EMC

Security based on trust not fear
sponsored by Qualys
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This paper provides examples showing how cloud services can be used to ensure that web applications and websites can instill trust and confidence in the minds of customers.
Get This Now
Qualys

Channel Edge Reseller Program
sponsored by Webroot
White Paper: | Posted: 16 Apr 2014
Published:30 Aug 2013
Summary:This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Get This Now
Webroot

Channel Edge MSP Program
sponsored by Webroot
White Paper: | Posted: 16 Apr 2014
Published:30 Aug 2013
Summary:This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.
Get This Now
Webroot

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 16 Apr 2014
Published:16 Apr 2014
Summary:This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Get This Now
RSA, The Security Division of EMC

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
White Paper: | Posted: 15 Apr 2014
Published:31 Dec 2013
Summary:This white paper highlights the benefits of a federated identity that can help you improve efficiencies, reduce risks, and maximize ROI.
Get This Now
Radiant Logic, Inc.

2013 MarketScope Report for Web Access Management
sponsored by IBM
Analyst Report: | Posted: 15 Apr 2014
Published:15 Nov 2013
Summary:This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Get This Now
IBM

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
White Paper: | Posted: 14 Apr 2014
Published:31 Dec 2013
Summary:This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Get This Now
IBM

How-to Build High Performance Security for the Software-Defined Data Center - Vendor Webcast
sponsored by Trend Micro
Webcast: | Posted: 14 Apr 2014
Premiered:Apr 9, 2014
Speaker:  Andrew Nelson, SE specialist focused on enterprise and strategic accounts
Steve Neville, Director of Cloud and Data Center Security
Summary:This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments.
Get This Now
Trend Micro

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
White Paper: | Posted: 11 Apr 2014
Published:28 Feb 2010
Summary:This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Get This Now
Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
White Paper: | Posted: 11 Apr 2014
Published:28 Feb 2010
Summary:This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Get This Now
Imprivata

Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
White Paper: | Posted: 11 Apr 2014
Published:11 Apr 2014
Summary:This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Get This Now
BlackBerry

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
White Paper: | Posted: 11 Apr 2014
Published:31 Dec 2012
Summary:Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Get This Now
EMC Corporation

1 - 15 of 604 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com