Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER:
Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
sponsored by IBM
WHITE PAPER:
This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
Posted: 19 Nov 2007 | Published: 01 Mar 2007
|
|
|
Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
The Evolution of Password Authentication and Management: A Simple Solution
sponsored by PistolStar, Inc.
WHITE PAPER:
This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006
|
|
|
A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER:
This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007
|
|
|
Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER:
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008
|
|
|
Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER:
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
Directory Services Integration with Database Enterprise User Security
sponsored by Oracle Corporation
WHITE PAPER:
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008
|
|
|
Dark Pools of Liquidity: Understanding & Technology dependencies for the future
sponsored by Wipro
WHITE PAPER:
This white paper provides insight into the dark pools of liquidity, discusses the mechanism of dark pools trading, advantages and how technology would impact the operations or provide benefits in trading over this medium.
Posted: 13 May 2009 | Published: 12 May 2009
|
|
|
Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER:
Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006
|
|