password policy

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Mar 14, 2016
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
     Okta
By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
     Okta
By: Okta     Published Date: Aug 24, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
     Okta
By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, mobile workers, wireless communications
     Imprivata
By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : pdf security, pdf passwords, pdf drm, adobe pdf security, security, application security, encryption, password management
     LockLizard
By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
     Cisco
By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
     Cisco
By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, intrusion prevention, mobile workers
     Imprivata
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.