Remote Authentication White Papers

(View All Report Types)
Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER: This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business