WHITE PAPER:
Oracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources.
WHITE PAPER:
Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
WEBCAST:
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
EBOOK:
The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
CASE STUDY:
This brief case study reveals how the right analytics tool allowed Revas, the outsourcing arm of accounting and consulting firm Baker Tilly, to upgrade reporting and enhance its client portal.
WHITE PAPER:
Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
EGUIDE:
In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
EZINE:
This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
WHITE PAPER:
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
EBOOK:
In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.