Security White Papers

New Whitepapers

 

 

 

Centrify

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

As mobile devices have pushed their way into the enterprise, they have brought cloud apps along with them.
This app explosion means account passwords are multiplying, which exposes corporate data and leads to help desk calls from frustrated users.
This paper will discover how IT can improve user productivity, gain visibility and control over SaaS and mobile apps, and stop password sprawl.
Download this white paper to learn:

  • How you can leverage your existing AD to manage app access.
  • Key capabilities to consider when implementing Single Sign-On (SSO).
  • How SSO can boost IT satisfaction and improve security.
Centrify

Office 365 Single Sign-On: High Availability without High Complexity

For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably will expectedly experience an increase in risk and a decline in productivity.


This technology brief will explain why highly reliable SSO between your on-premise network and O365 is crucial, and why that implementation is surprisingly difficult to achieve using the accessory tools provided with O365. Learn the best-in-class approach that allows you to leverage your preexisting multiple-site Active Directory infrastructure to make SSO reliable and simple.

Centrify

3 Reasons to Give Insiders a Unified Identity

Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access

 

Axis logo

IP opens doors to a new world of physical access control

It is no exaggeration to say that network video has revolutionized the world of CCTV. Now the access control industry is on the verge of a similar, groundbreaking development. The migration of access control systems to a digital environment is sure to bring many benefits, i.e. lowering installation costs, facilitating configuration and management, while simultaneously enhancing the versatility of the systems and opening up for integration with other security products. Learn how Axis Communications is pioneering open IP philosophy within physical access control through this whitepaper and by visitingwww.axis.com/pacs.

Company Information:
Axis Communications
300 Apollo Drive
Chelmsford, MA 01824
Phone: 800-444-2947
Fax: 978 614 2100
HID logo

The Convergence of IT Security and Physical Access Control

Organizations are increasingly adopting a model in which multiple access control use cases and identities can be supported on a single card or smartphone, thus eliminating the need to remember passwords, or carry multiple cards. This convergence allows smart cards or smartphones manage network and physical access, accessing cloud-based applications, and enables other applications including cashless vending, time and attendance, and secure print management.

There is growing demand for provisioning IT and physical access control system (PACS) credentials to a single card or smartphone, using a single set of processes. Beyond convenience, the convergence of credentials onto a single card or device can greatly improve security and reduce ongoing operational costs. It also centralizes identity and access management, consolidates tasks and enables organizations to quickly and effectively use strong authentication throughout their infrastructure to protect access to all key physical and IT resources.

The new, integrated credential management model moves organizations in four important directions: beyond cards to smartphones; beyond readers to “tap-in” access convenience; beyond Public Key Infrastructure (PKI) technology to simplified solutions for higher security; and beyond legacy PKI to true converged strong authentication access control.

This white paper looks at the drivers, challenges, deployment options and results associated with a converged IT and physical access control solution, and describes the value of a seamless user experience when using cloud-based applications and services, accessing data, and opening doors. It also explains the benefits of unified enrollment processes and workflows spanning multiple identities across multiple IT security applications and the PACS.

 

Contact info:
HID Global
611 Center Ridge Dr
Austin, TX 78753
949.732.2000
insidesales@hidglobal.com
www.hidglobal.com

 

 

 

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+