White Papers


ScriptLogic: Effective Desktop Management Under FDCC

The Federal Desktop Core Configuration (FDCC) standards have created a unique set of challenges for federal agency IT departments. While the current focus has been on scanning and reporting compliance rates, future efforts will be centered on successfully improving compliance through effective policy and exception management. Native tools provide some of the capabilities, but to really effectively manage the desktop in an FDCC environment; more granular management options are needed. This paper is intended to introduce some of those challenges and provide some options for resolving them.


maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.


The Primer: Nuts and Bolts of Federated Identity Management

For any IT department, it is imperative to understand how your organization can securely manage and control users’ identities. With so many employees accessing up to thirty different resources over the Internet to do their daily jobs—often with thirty different usernames and passwords—organizations are struggling to maintain a secure working environment. This white paper provides an introduction to leveraging user credentials securely through federated identity management.




HID Global – Physical Security on the Edge

While traditional solutions for integrating physical and logical access have historically been intrusive, difficult to deploy and very costly, a new generation of access control solutions that are IP-enabled are paving the way for organizations to make what once was a futuristic scenario, a viable reality. HID Global is meeting these security challenges head on with its new Edge™ Family of IP-based access solutions.


maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.


Mail-SeCure – A Complete Perimeter Security Solution

Protecting ones network from hostile attacks has become a full time job. Especially today, when networks have become an easy target for hackers, intruders, abusers, Email Viruses, Worms, Trojan-horses, Phishing, Spam and DoES (Denial of Email Service).


Two-Factor Authentication Without Tokens: PhoneFactor ™

For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is only continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying usernames and passwords for authentication is insufficient. While two-factor authentication is an effective security solution, traditional token-based systems have been difficult to implement and administer, leading to limited adoption.


Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge.


SSO Over the Internet: The CISO’s Misperceptions and Realities

Ping Identity conducted anonymous interviews of seventeen Chief Information Security Officers (CISOs) and Information Security Officers across financial services, healthcare, education, insurance and business services. What we learned was surprising: many of the survey participants share three common misperceptions about secure Internet single sign-on (SSO).


Federated Provisioning: The Synergy of Identity Federation and User Provisioning

This paper provides a background of federation and provisioning concepts, functional operations, and standards. A complex provisioning use case is presented to demonstrate the potential combination of SPML and SAML in a federated environment.


  • Ahead of Current Events Ahead of Current Events

    In this episode, Ralph C. Jensen chats with Dana Barnes, president of global government at Dataminr. We talk about the evolution of Dataminr and how data software benefits business and personnel alike. The Dataminr mission is to keep subscribers up-to-date on worldwide events in case of employee travel. Barnes recites Dataminr history and how their platform works. With so much emphasis on cybersecurity, Barnes goes into detail about his cybersecurity background and the measures Dataminr takes to ensure safe and secure implementation.

Digital Edition

  • Environmental Protection
  • Occupational Health & Safety
  • Spaces4Learning
  • Campus Security & Life Safety