White Papers


maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.


The Primer: Nuts and Bolts of Federated Identity Management

For any IT department, it is imperative to understand how your organization can securely manage and control users’ identities. With so many employees accessing up to thirty different resources over the Internet to do their daily jobs—often with thirty different usernames and passwords—organizations are struggling to maintain a secure working environment. This white paper provides an introduction to leveraging user credentials securely through federated identity management.


HID Global – Physical Security on the Edge

While traditional solutions for integrating physical and logical access have historically been intrusive, difficult to deploy and very costly, a new generation of access control solutions that are IP-enabled are paving the way for organizations to make what once was a futuristic scenario, a viable reality. HID Global is meeting these security challenges head on with its new Edge™ Family of IP-based access solutions.




maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.


Mail-SeCure – A Complete Perimeter Security Solution

Protecting ones network from hostile attacks has become a full time job. Especially today, when networks have become an easy target for hackers, intruders, abusers, Email Viruses, Worms, Trojan-horses, Phishing, Spam and DoES (Denial of Email Service).


Two-Factor Authentication Without Tokens: PhoneFactor ™

For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is only continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying usernames and passwords for authentication is insufficient. While two-factor authentication is an effective security solution, traditional token-based systems have been difficult to implement and administer, leading to limited adoption.


Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge.


SSO Over the Internet: The CISO’s Misperceptions and Realities

Ping Identity conducted anonymous interviews of seventeen Chief Information Security Officers (CISOs) and Information Security Officers across financial services, healthcare, education, insurance and business services. What we learned was surprising: many of the survey participants share three common misperceptions about secure Internet single sign-on (SSO).


Federated Provisioning: The Synergy of Identity Federation and User Provisioning

This paper provides a background of federation and provisioning concepts, functional operations, and standards. A complex provisioning use case is presented to demonstrate the potential combination of SPML and SAML in a federated environment.


Achieving Universal Secure Identity Verification with Convenience and Personal Privacy: Privaris

The modern world has an unprecedented need for security. More than ever before, sensitive information, ranging from personal account numbers to government intelligence, is stored in databases that can be accessed via the Internet, cellular phones, and other networks. This information is a target for those who wish to exploit it for illegal purposes.


  • Chemical Distribution is No Place for a Bad Actor or Terrorist Chemical Distribution is No Place for a Bad Actor or Terrorist

    In this episode, Ralph C. Jensen and Eric Byer talk about Chemical distributors and their task to balance a host of security-related issues: from safely handling and transporting hazardous chemicals to securing facilities against inclement weather.

Digital Edition

  • Security Today Magazine - April 2021

    April 2021

    Featuring:

    • Transforming Security
    • Driving COVID Adaptations
    • A Capitol Breach
    • Running the Gauntlet
    • On a Cloud of its Own

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety