Password Management

A Password Manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or files that holds the encrypted password data. Many password managers also work as a form filler, thus they fill the user and password data automatically into forms. Some have password generator capabilities.
Results 1 - 25 of 110Sort Results By: Published Date | Title | Company Name
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
     Brainloop
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication
     VASCO Data Security International, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.
Tags : citrix, security, mobile, password management, mobile computing, mobile workers, wireless phones, wireless security
     Citrix Systems, Inc.
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
     Entrust Datacard
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates
     Entrust Datacard
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys, access control, application security, authentication
     Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys, access control, application security, authentication
     Venafi
By: Centrify     Published Date: Sep 08, 2015
Download this white paper to learn about managing and securing Macs and other mobile devices.
Tags : device management, security management, mobility, application security, management solutions, anti spyware, firewalls, password management
     Centrify
By: Docusign     Published Date: Feb 18, 2015
This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.
Tags : esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer, identification signer, authentication, identity management
     Docusign
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : authentication, security, risk-based authentication, network security, access control, password management, security management, web service security
     CA Technologies
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
     Thawte
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
     F5 Networks Inc
By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
     Imprivata
By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
     Norse
By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security
     Rapid7
Start   Previous   1 2 3 4 5    Next    End
Search White Papers