White Papers

The Primer: Nuts and Bolts of Federated Identity Management

For any IT department, it is imperative to understand how your organization can securely manage and control users’ identities. With so many employees accessing up to thirty different resources over the Internet to do their daily jobs—often with thirty different usernames and passwords—organizations are struggling to maintain a secure working environment. This white paper provides an introduction to leveraging user credentials securely through federated identity management.

HID Global – Physical Security on the Edge

While traditional solutions for integrating physical and logical access have historically been intrusive, difficult to deploy and very costly, a new generation of access control solutions that are IP-enabled are paving the way for organizations to make what once was a futuristic scenario, a viable reality. HID Global is meeting these security challenges head on with its new Edge™ Family of IP-based access solutions.

maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.

Mail-SeCure – A Complete Perimeter Security Solution

Protecting ones network from hostile attacks has become a full time job. Especially today, when networks have become an easy target for hackers, intruders, abusers, Email Viruses, Worms, Trojan-horses, Phishing, Spam and DoES (Denial of Email Service).

Two-Factor Authentication Without Tokens: PhoneFactor ™

For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is only continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying usernames and passwords for authentication is insufficient. While two-factor authentication is an effective security solution, traditional token-based systems have been difficult to implement and administer, leading to limited adoption.

Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge.

SSO Over the Internet: The CISO’s Misperceptions and Realities

Ping Identity conducted anonymous interviews of seventeen Chief Information Security Officers (CISOs) and Information Security Officers across financial services, healthcare, education, insurance and business services. What we learned was surprising: many of the survey participants share three common misperceptions about secure Internet single sign-on (SSO).

Federated Provisioning: The Synergy of Identity Federation and User Provisioning

This paper provides a background of federation and provisioning concepts, functional operations, and standards. A complex provisioning use case is presented to demonstrate the potential combination of SPML and SAML in a federated environment.

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy: Privaris

The modern world has an unprecedented need for security. More than ever before, sensitive information, ranging from personal account numbers to government intelligence, is stored in databases that can be accessed via the Internet, cellular phones, and other networks. This information is a target for those who wish to exploit it for illegal purposes.

A Practical Approach to Managing Phishing: Paypal

Surely only a few individuals, who have been living a life of seclusion on the French Riviera for the last few years, won’t know what the crime of “phishing” is. At least that’s what we tend to think in the security industry. Yet, according to Gartner estimates, 3.3% of the 124 million consumers who received phishing email last year were victimized and lost money because of the attacks.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety