Top White Papers and Webcasts

  • On-demand Event Event Date: January 27, 2015 For years, identity and access management (IAM) has been seen as the project of denial, restriction, limitation and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue-generating work. In fact, at times, the processes forced employees, partners and customers to spend precious time searching for ways to circumvent the IAM infrastructure in order to do their jobs. The …

  • Live Event Date: February 25, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The best way to do this is to put yourself into the hacker's role and perform all the activities they would do as well. The results can give you a perspective on what other people with bad intentions can see. Check out this upcoming eSeminar and join a panel of industry experts as they uncover the darker side of IT security and propose …