Access ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsAccess Control  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 414 | Next Page

Communication and Collaboration Solutions for Your Business by Cisco (E-mail this company)

March 29, 2013 - (Free Research)
This Forrester Research paper unveils the need for UC&C in mid-sized businesses today and outlines the many benefits you can enjoy after implementation. 
(WHITE PAPER) READ ABSTRACT |

Five Pillars for Controlling Firewall ACLs and Rules by Infoblox

January 31, 2013 - (Free Research)
Read this white paper to learn how to leverage automation to shorten time to deploy, improve staff efficiency and maintain a secure network. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Security Breaches and Minimizing the Impact by Dell SecureWorks UK

May 23, 2013 - (Free Research)
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 30, 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Sophos EndUser Protection Overview by Sophos, Inc.

January 10, 2013 - (Free Research)
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage. 
(VIDEO) READ ABSTRACT |

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 05, 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

Cisco Unified Access Technology Overview: Converged Access by Cisco (E-mail this company)

January 11, 2013 - (Free Research)
Read this white paper to learn about a strategy that could help you manage the growth of mobile devices and traffic effectively, as well as make your business faster, more efficient, and more connected than ever before. 
(WHITE PAPER) READ ABSTRACT |

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing by Ping Identity Corporation

August 31, 2012 - (Free Research)
In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 30, 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

Fixing the "Everyone" Problem by Varonis

July 30, 2009 - (Free Research)
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It by Bloxx, Inc.

September 2008 - (Free Research)
The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet. 
(WHITE PAPER) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

September 2013 - (Free Research)
This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business. 
(ANALYST REPORT) READ ABSTRACT |

Ease GLBA Compliance with LogRhythm by LogRhythm, Inc.

October 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

The Top 10 Questions You Should Ask Vendors When Evaluating an In-House eDiscovery Solution. by StoredIQ

July 2008 - (Free Research)
This document examines the 10 top questions you should consider when evaluating an in-house eDiscovery solution. 
(WHITE PAPER) READ ABSTRACT |

Cisco ASA 5500 Series Adaptive Security Appliance by Cisco Systems, Inc.

August 2008 - (Free Research)
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management. 
(WEBCAST) READ ABSTRACT |

How can Cisco cloud security accelerate cloud adoption? by Cisco Systems, Inc.

October 2012 - (Free Research)
Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Next Generation Enterprise WAN Regional WAN Overview by Cisco Systems, Inc.

October 2011 - (Free Research)
Enterprises with large-scale networking needs including remote branch-office connectivity should read this white paper to get an overview of WAN architecture that not only provides advanced routing functionality, but also allows for video collaboration, access control and secure connectivity, application performance optimization, mobility and more! 
(WHITE PAPER) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Revolutionary architecture, evolutionary deployment by Cisco (E-mail this company)

February 2013 - (Free Research)
Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely by Cisco (E-mail this company)

June 2011 - (Free Research)
Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management. 
(WHITE PAPER) READ ABSTRACT |

Protecting Information from Insider Threats by McAfee.

January 2012 - (Free Research)
Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat. 
(WHITE PAPER) READ ABSTRACT |

How to Build a Massively Scalable Next-Generation Firewall by Dell Software

August 2013 - (Free Research)
Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls. 
(WHITE PAPER) READ ABSTRACT |

Managing Access Security in a Multi-Perimeter World by IBM

December 2012 - (Free Research)
Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise. 
(WEBCAST) READ ABSTRACT |

BYOD: Device Freedom Without Compromising the IT Network by Cisco (E-mail this company)

May 2013 - (Free Research)
Uncover the drivers, benefits, and challenges of Bring Your Own Device (BYOD) and learn how – with the right solution – you can keep your employees happy and organisation safe at the same time. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 414 | Next Page

> Explore alternative searches for: Access Control

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts