As the role of Active Directory evolves and becomes a central component of your infrastructure, consider the following steps to improve your security posture and your ability to facilitate productive ...
Now the application, which handles nearly 10 million authorization requests per year at Disney, is available to the public. Keystone provides a centralized engine that eliminates the need for ...
Responsibility for implementing authentication, authorization, auditing and personalization into applications has traditionally belonged to Web developers, even though they often lack security ...
Smart cards, authentication tokens, one-time passwords, an intrusion-detection system working with a virus-scanning gateway and a PC configuration monitoring and management suite can be used to build ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Let’s face it. Individuals with ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results