Carrier Access Codes Reports

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

Securing content and access with smart management techniques
sponsored by TechTarget Content Management
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

TechTarget Content Management

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global