Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Java, enterprise integration and open source Java.

Filter the library by ...
CLEAR

White Paper | Presented by Safebreach

What Is the General Data Protection Regulation (GDPR)

Are you ready for the GDPR? The GDPR impacts any company that collects data on EU citizens - regardless of company location. This whitepaper outlines critical parts of the GDPR, and proposes a multi-step approach to drive compliance.

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP

For many organizations, SAP applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Bakersfield Police Department locks down remote access with Defender

To increase security of mobile computing devices used by the city's police department and other field personnel, as well as comply with federal requirements to provide secure remote access, The City of Bakersfield implemented Defender to enable two-factor authentication and to comply with the U.S. Department of Justice requirements.

White Paper | Presented by One Identity

City of Frankfurt work life realignment for local authority staff

Authority in Frankfurt enables flexible working hours and homeworking with the help of secure and user-friendly two-factor authentication software

White Paper | Presented by One Identity

Defender - The Right Way to Prove Identity and Establish Trust

This paper explains how you can prove the identity of the other party in an e-transaction or exchange of information. It also describes why Defender is an excellent solution to help you accomplish this. Seamlessly integrated with Microsoft's Active Directory, Defender offers a truly extensible architecture that is capable of scaling to fit your business needs.

eBook | Presented by One Identity

Future-Proof Your Tactical IAM Projects.

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

Future-Ready Identity and Access Management

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

Futuriom SD-WAN Growth Outlook Report

Are you curious about why everybody in networking is talking about SD-WAN? People are saying that it is the most promising emerging technology to develop in the networking business since MPLS, enabling more efficient connectivity from the branch office to the data center and to the cloud.

eBook | Presented by One Identity

IAM for the Real World Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you'll discover: today's key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity.

eBook | Presented by One Identity

Identity and Access Management for the Real World The Fundamentals

This short e-book "Identity and Access Management for the Real World" evaluates what IAM for the real world would, should and can look like, including best practices. It delves into the most pressing identity management and access management issues faced by virtually every organization and offers actionable, affordable and sustainable best practices for the IAM challenges you face.

Load More