WHITE PAPER:
Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
WHITE PAPER:
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
WHITE PAPER:
Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
WHITE PAPER:
This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
WHITE PAPER:
Discover key tips for protecting, maintaining and recovering your Group Policy infrastructure in this essential resource. Find out how you can secure every desktop and server in your Windows environment with these best practices.
WHITE PAPER:
In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
WHITE PAPER:
This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
WHITE PAPER:
This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
WHITE PAPER:
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
WHITE PAPER:
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.