Password Management White Papers

A Password Manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or files that holds the encrypted password data. Many password managers also work as a form filler, thus they fill the user and password data automatically into forms. Some have password generator capabilities.
Results 1 - 25 of 96Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.

Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.

Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

This paper examines the role that Kaspersky Endpoint Security for Business has in meeting IT needs related to ease of use, effectiveness and return-on-investment in the strategically important market for endpoint security

Tags : endpoint security, security, it security, access control, idc, kaspersky, identity management, password management
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: CA Technologies     Published Date: Jan 08, 2014

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Rapid7     Published Date: Jul 24, 2013

As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.

Tags : rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security
    
By: McAfee     Published Date: Feb 06, 2013

Users who take work with them everywhere unknowingly jeopardize networks and systems.

Tags : windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This report details the current state of the security management market and what to expect moving forward.

Tags : security, testing, security controls, security management, tools, siem, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

In this age of APTs you canít leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.

Tags : software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam
    
By: Lumension     Published Date: Jan 18, 2013

News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.

Tags : security, network security, network protection, data security, data protection, cyber attack, case study, encryption
    
By: McAfee     Published Date: Nov 14, 2012

Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.

Tags : database, security, mcafee, data breach, compliance, ipsec, password management, database security
    
By: Splunk     Published Date: Apr 16, 2012

Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.

Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Oracle     Published Date: Apr 03, 2012

Download this free white paper to learn how platform-as-a-service private cloud offers enterprises one of the best ways to take advantage of cloud computing.

Tags : oracle, cloud, private cloud, middleware, platform as a service, stack, architecture, silo
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Start   Previous   1 2 3 4    Next    End