Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Verizon

Get Powerful VoIP and Reliable Internet Connectivity

When customers turn to you for support, they expect you to be available. While today’s business communications solutions tend to focus on technologies like live chat and mobile apps, a dependable phone system and reliable internet connectivity is still just as important as ever.

Video/Webcast | Presented by Druva & AWS

Safeguard your Life Sciences Data with Druva and AWS

In 2018, analysts expect acquisitions to drive business decisions for many Healthcare and Life Sciences organizations. During a consolidation, you want to secure both business assets and intellectual property, and ensure that your data is securely backed up, as part of your overall data management plan.

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP®

For many organizations, SAP® applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Securely Managing Your UNIX Environment

This white paper details those challenges and explains how they can be overcome with the right practices and the right tools, enabling you to enhance security, achieve compliance, and dramatically improve operational efficiency

White Paper | Presented by One Identity

Controlling and Managing Super user Access

Security and compliance are driving forces behind many IT initiatives. That makes controlling and managing privileged access a high priority for any IT team. Yet, as vital as it is to effectively manage privileged accounts, native tools and manual practices aren’t good enough in today’s complex heterogeneous environments

eBook | Presented by One Identity

IAM for the Real World – Privileged Account Management e-book

Read this white paper for essential information on the common security issues with privileged account management, and how you can minimize or eliminate them altogether.

White Paper | Presented by One Identity

Strategies for successfully managing privileged accounts

Privileged accounts and users with elevated access have unique requirements that often push management and governance beyond the reach of traditional methods for privileged account management (PAM).

White Paper | Presented by One Identity

The Low hanging fruit of IAM – three fundamental things you should be doing

This paper covers where to start (focus on your greatest need) and what three fundamental things you should do to simplify and accelerate achieving governance.

White Paper | Presented by One Identity

8 Best Practices for Identity and Access Management

Too often, IT is placed in the role of “gatekeeper” simply because only IT has the tools needed to manage identity. But with the right identity management tools in place, IT maintains the tools and infrastructure, and the business controls the actual identities.

eBook | Presented by One Identity

Identity and Access Management for the Real World: The Fundamentals

This short e-book “Identity and Access Management for the Real World” evaluates what IAM for the real world would, should and can look like, including best practices.

Load More