Identity and Access Management White Papers

(View All Report Types)
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER: This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.