-
Ensure Compliance with PCI Regulations & Section 404 of the Sarbanes Oxley Act with Cyber-Ark Software's Digital Vaults & Password Vaults. Leader in Identity & ...
www.cyber-ark.com - 2009-02-06
-
Imprivata helps organizations secure their networks by offering a single sign-on in an appliance-based authentication and access management solution.
www.impravada.com - 2009-02-08
-
Avatier Identity Management Software Solutions leader develops and sells security software for password management, user provisioning, and user deprovisioning.
www.accountcreator.com - 2009-02-04
-
Avatier Identity Management Software Solutions leader develops and sells security software for self-service password reset, password synchronization, user ...
www.passwordstation.com - 2009-02-04
-
J2EE Security Pattern, J2EE Security Patterns, CISSP reference, Security Pattern, Security Patterns, Java Cryptography, Java Security, Java Patterns, Identity ...
CISSP reference  Core J2EE Security Pattern  Core J2EE Security Patterns  J2EE Security Pattern  J2EE Security Pattern Catalog  J2EE Security Patterns  J2EE Security Refactoring  Java Patterns  Security Patterns 
www.coresecuritypatterns.com - 2009-02-04
-
Net Studio: progettazione e implementazione di soluzioni ad hoc sui temi dell’IT ritenuti strategici - sicurezza perimetrale e logica, prato, toscana, surf c ...
sicurezza perimetrale e logica  system integration toscana 
www.netstudio.it - 2009-02-09
-
Identricity.com covers identity and access management news from Australia and around the world, with a particular focus on those eccentricities of idm|iam|im in ...
iandam 
www.identricity.com - 2009-04-02
-
HIPAAT Consent Management Solutions
consent aggregation  consent directives  consent management  consent validation  policy decision  security breach notification 
www.hipaat.com - 2009-02-07
-
חברת IQS מציעה לארגונים שילוב התקני זיהוי מתקדמים לצורך זיהוי חד חד ערכי של המשתמשים בכניסה למערכות המידע והגישה הארגוניים תוך כדי הבנת הרגישויות והצרכים של הלקוח ...
Fingerprint token  אמצעים ביומטריים  ביומטריה בקיוסק מידע  בקרת גישה  התחזות  זיהוי באמצעות  זיהוי באמצעות טביעת אצבע  טביעת אצבע  טוקן  טוקן ביומטרי  כרטיס חכם  כרטיס מגנטי  פייר אוול  פתרונות אבטחת מידע  שילוב אצבע בבקרת כניסה  שילוב זיהוי 
www.iqs.co.il - 2009-03-09
-
Eclipsecurity enables companies to thrive by protecting competitive advantages. Assess exposure. Prevent breaches. React to intrusion. Enhance systems. Secure ...
www.eclipsec.com - 2009-02-12
|
labor union
business
iam
provisioning
identity management
management
privacy
billing
security
advanced
|
|