Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Authentication - Encryption

Browse through our extensive list of free Authentication - Encryption magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Multi-Factor Authentication Without Tokens or Passwords Veridium's white paper explains how to use biometric authentication to access Active..
The Evolving Architecture of Modern Identity The world of digital business is placing increasing demands on identity and access management..
Crypto 101 Want to know how to exploit a common cryptographic flaw or forge administrator cookies, recover passwords?..
Clickjacking Defense Cheat Sheet This cheat sheet is focused on providing developer guidance on Clickjacking/UI Redress attack prevention...
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Two-Factor Authentication Evaluation Guide The ultimate guide to assessing and comparing two-factor authentication solutions...
Managing Change and Complexity with Identity and Access Governance In this white paper, we will examine some of the challenges that modern..
Single Sign-On: With Passwords, Less Is More Single Sign-On (SSO) gives users a streamlined way to access applications and data and gives IT..
Three Ways to Integrate Active Directory with Your SaaS Applications This paper will discuss three different options for integrating Active..
Cybersecurity: A Small Business Guide An overview of everything you need to know to protect yourself and your business...
Global Trends in Identity Governance & Access Management Learn the 12 trends that will have a significant impact on how organizations will..
Ensuring PCI Compliance with Identity and Access Management Learn from an industry expert how to comply with the Payment Card Industry Data..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
Closing the Loopholes in Identity Governance to Minimize Risk Determine if you have loopholes in your identity governance program...
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
5 Ways to Encrypt Email for Linux Email is still important for business, and it is necessary to keep it encrypted. Here are 5 ways you can..
Security for E-Signatures and E-Transactions Discover how to build effective, end-to-end security around your business tractions with..
Under the Hood: Updates and Improvements in Active Directory Tools for Windows Server 2012 Master Active Directory management in Windows..
MongoDB Performance with Vormetric Transparent Encryption In enterprises around the world, data volumes have been undergoing explosive..
Ensuring HIPAA and HITECH Compliance with Identity and Access Management View this on-demand webinar to learn how leading healthcare..
11 Security Solutions for Small Business Here are 11 small-business-friendly cybersecurity solutions to get you started on protecting your..
Beginner's Guide to Multi-factor Authentication Cut through the authentication jungle...
PasswordCourier with Telephone Access Learn how to reset forgotten passwords through an Interactive Voice Response application, using a..
The Complete Guide to Simplifying and Securing Your Life with LastPass and Xmarks By downloading this free guide, you agree to receive..
17 Questions to Ask Your IAM Provider This paper provides 17 important questions to ask your current or potential IAM provider so that you..
Privacy and Security Advantages of Social Login The practice of solely implementing traditional username/password authentication flows on..
Cyber Warnings E-Magazine - May 2017 Edition Published monthly by Cyber Defense Magazine, Cyber Warnings shares a wealth of information to..
PasswordCourier Transparent Synchronization Learn how to synchronize passwords using native password change tools in supported systems and..
Looking Forward: Today's Risks Require Tomorrow's Authentication This white paper discusses the changing landscape and business drivers..
Password Your Days are Numbered Review this infographic to get a sense of why many enterprises are moving away from passwords as a main..
Modern Retail Security Risks: Avoiding Catastrophic Data Breaches in the Retail Industry Download this guide to learn more about how to..
Multifactor Authentication: Removing Risk While Simplifying Processes Learn why Multifactor Authentication (MFA) greatly reduces the risk of..
Security Across the Enterprise - Customer Success Stories Welcome to a collection of success stories provided by our valued customers..
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Adding Value Research Brief for Affinity Organizations The more information people share online, the more they have at risk...
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
A New Look at the ROI for Enterprise Smart Cards Learn about the latest trends in smart card deployments, the value of converged access, SSO..
Customer Identity and Access Management Learn how to turn digital business transformation into a competitive advantage...
Remove Risk and Simplify with Multifactor Authentication Learn the important factors you need to consider when moving to MFA, plus 4 things..
Password Reset: The Time Vampire of the IT Universe Maybe Passwords Aren't Dead After All...
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
FFIEC Authentication Guidance: How to Conform to Combat Fraud Fraud prevention best practices for IT professionals in banks and credit..
Cryptographic Storage Cheat Sheet This cheat sheet provides a simple model to follow when implementing solutions for data at rest...
Multi-Step Authentication and Why You Should Use It Authentication is one of the essential components of security; it is one part of the..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Oracle Web Services Manager: Authentication and Authorization A free sample chapter from Packt Enterprise's book: Oracle Web Services..
Multi-factor Authentication Evaluation Checklist The need for multi-factor authentication is clear, but knowing how to find the solution..
Contemporary Cryptography These slides are intended for computer scientist, electrical engineers, and mathematicians both in research and..
IT Security Vendor Analysis by Bizety This paper examines 5 major vendors and outlines how their products can coordinate to successfully..
An Overview of Okta's Multifactor Authentication Capability Learn how Okta brings multifactor authentication to the cloud for both higher..
Security and Usability: How New Authentication Methods Eliminate Old Trade-offs There's a long history of trade-offs between security and..
5 Reasons for Federated Single Sign-On In this eBook, we discuss federated Single Sign-On and the value it can bring to your organization...
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
Two-Factor Authentication Evaluation Guide Learn what to look for when assessing and comparing two-factor authentication solutions...
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
Best Practices for Handling a Data Breach It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless..
Why You Should Care About Identity-as-a-Service (IDaaS): An Expert's perspective There's a lot of discussion going on lately about identity...
Microsoft 70-640 Windows Server 2008 - Special Edition Practice Exam Prep Software and Study Guide Provides their unique triple testing mode..
After A Data Breach: Managing Identity Theft Effectively Life can seem surreal for identity victims...
API Security: A Disjointed Affair This white paper analyzes the findings of a survey into the state of Application Programming Interface..
Enterprise Password Management - A Guide for Best Practices Learn how using RoboForm Enterprise is an easy, secure, and practical solution..
IxSecure: 360° Security Protection Security is much more than layers of defense...
Architecting Active Directory Federation across Office 365, Azure and On Premises IT This recorded webinar focuses specifically on..
Copyright © 2017 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to's Privacy Policy.
Resources: | FAQ | Legal Notices