WHITE PAPER:
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
WHITE PAPER:
Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
WHITE PAPER:
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
WHITE PAPER:
View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
WHITE PAPER:
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
WHITE PAPER:
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
WHITE PAPER:
Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
WHITE PAPER:
Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP.
WHITE PAPER:
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.