WHITE PAPER:
Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
WHITE PAPER:
NEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.
WHITE PAPER:
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
WHITE PAPER:
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
WHITE PAPER:
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
WHITE PAPER:
This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
WHITE PAPER:
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.