Authentication, Authorization, and Accounting White Papers

(View All Report Types)
Strategies for Enhancing the Clinician’s Workstation Productivity
sponsored by Siemens
WHITE PAPER: Access this resource to learn about the top 3 challenges with clinician desktop and workspace productivity, and which key strategies (e.g. desktop virtualization, single sign-on, etc.) will help enhance workflows, therefore improving clinical IT adoption.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Siemens

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Securing and Managing Your Enterprise: An Integrated Approach
sponsored by Novell, Inc.
WHITE PAPER: Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell®
Posted: 07 Dec 2009 | Published: 04 Dec 2009

Novell, Inc.

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Simplifying and Securing Group Policy Management
sponsored by Dell Software
WHITE PAPER: Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
Posted: 13 Apr 2012 | Published: 31 Dec 2011

Dell Software