WHITE PAPER:
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
EBOOK:
The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
PRESENTATION TRANSCRIPT:
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
EZINE:
This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
EGUIDE:
This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
TRIAL SOFTWARE:
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
WHITE PAPER:
Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
WHITE PAPER:
Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
WHITE PAPER:
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.