User Authentication White Papers

(View All Report Types)
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

TechTarget Security

SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006

SAP America, Inc.

Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER: A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

EMC Documentum Information Rights Management
sponsored by EMC Corporation
WHITE PAPER: This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
Posted: 05 May 2008 | Published: 12 Dec 2006

EMC Corporation

Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER: This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008

PistolStar, Inc.

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.