Password Policies Reports

Eliminating Notes ID File Password Management: A Ground-breaking Alternative
sponsored by PistolStar, Inc.
WHITE PAPER: Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

PistolStar, Inc.

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Moving Past the Password? Not So Fast
sponsored by TechTarget Security
EBOOK: The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016

TechTarget Security

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
sponsored by Intel
WHITE PAPER: In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Intel

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM