Password Provisioning White Papers

(View All Report Types)
Password Management Project Roadmap
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008

PistolStar, Inc.

Eliminating Notes ID File Password Management: A Ground-breaking Alternative
sponsored by PistolStar, Inc.
WHITE PAPER: Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

PistolStar, Inc.

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Implementing an identity management solution
sponsored by SAP America, Inc.
WHITE PAPER: This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
Posted: 18 Jun 2008 | Published: 01 Sep 2007

SAP America, Inc.