Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Miscellaneous | Presented by Anexinet

[WEBINAR] 5 Key Steps to Disaster Recovery Nirvana

Join Anexinet Cloud Solutions Director Ned Bellavance as he discusses the five key steps to get you well on your way to Disaster Recovery Nirvana, including: • How disaster Recovery is more than just technology • Disaster Recovery Plan testing strategies • Affordable, robust hybrid DR solutions

Adopting a Low-Risk, High-Reward Approach to Modern Infrastructure

Read our whitepaper and discover how HPE GreenLake Flex Capacity delivers all the industry’s finest IT – and at a highly affordable price.

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP®

For many organizations, SAP® applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Securely Managing Your UNIX Environment

This white paper details those challenges and explains how they can be overcome with the right practices and the right tools, enabling you to enhance security, achieve compliance, and dramatically improve operational efficiency

White Paper | Presented by One Identity

Controlling and Managing Super user Access

Security and compliance are driving forces behind many IT initiatives. That makes controlling and managing privileged access a high priority for any IT team. Yet, as vital as it is to effectively manage privileged accounts, native tools and manual practices aren’t good enough in today’s complex heterogeneous environments

eBook | Presented by One Identity

IAM for the Real World – Privileged Account Management e-book

Read this white paper for essential information on the common security issues with privileged account management, and how you can minimize or eliminate them altogether.

White Paper | Presented by One Identity

Strategies for successfully managing privileged accounts

Privileged accounts and users with elevated access have unique requirements that often push management and governance beyond the reach of traditional methods for privileged account management (PAM).

White Paper | Presented by One Identity

The Low hanging fruit of IAM – three fundamental things you should be doing

This paper covers where to start (focus on your greatest need) and what three fundamental things you should do to simplify and accelerate achieving governance.

White Paper | Presented by One Identity

8 Best Practices for Identity and Access Management

Too often, IT is placed in the role of “gatekeeper” simply because only IT has the tools needed to manage identity. But with the right identity management tools in place, IT maintains the tools and infrastructure, and the business controls the actual identities.

eBook | Presented by One Identity

Identity and Access Management for the Real World: The Fundamentals

This short e-book “Identity and Access Management for the Real World” evaluates what IAM for the real world would, should and can look like, including best practices.

Load More