Access ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsAccess Control  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 422 | Next Page

Deploying Communications and Collaborations Solutions for Your Medium-Sized Business by Cisco (E-mail this company)

March 29, 2013 - (Free Research)
This resource examines the challenges that medium-sized businesses face in identifying communications and collaboration solutions that meet today's business requirements, and explores how cloud communication and collaboration technologies can help organizations to resolve these issues. 
(WHITE PAPER) READ ABSTRACT |

CA Technologies Strategy & Vision for Cloud Identity and Access Management by CA Technologies.

February 28, 2013 - (Free Research)
This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

SuperMassive Series data sheet by Dell Software

July 31, 2013 - (Free Research)
The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Simplifying your Compliance Strategy by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

PCI and PA DSS Compliance Assurance with LogRhythm by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs. 
(WHITE PAPER) READ ABSTRACT |

Vendor Report Card: Security Information & Event Management by LogRhythm, Inc.

September 04, 2013 - (Free Research)
This in-depth white paper expertly breaks down the current SIEM marketplace, and will help you differentiate between the many vendors in order to ultimately decide on a solution that aligns with your organization's needs. 
(ANALYST REPORT) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by Dell Software

July 31, 2012 - (Free Research)
Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 31, 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 30, 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 23, 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK) READ ABSTRACT |

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line by BeyondTrust Corporation

February 16, 2009 - (Free Research)
Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation. 
(WHITE PAPER) READ ABSTRACT |

Build Your Identity And Access Management Strategy by Symplified

March 14, 2012 - (Free Research)
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Topographies for the Simply Connected Campus: Juniper's Simply Connected Campus Network Platform Architectures by Juniper Networks, Inc.

May 31, 2012 - (Free Research)
Uncover a set of solutions that can help you satisfy all the requirements of a campus network, conquer the environment's inherent challenges, and provide a wired-like experience to your end users, no matter what device they are using. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 11, 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

Linking Identity and Data Loss Prevention to Avoid Damage to Brand, Reputation and Competitiveness by CA Technologies.

May 01, 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 01, 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Managing Access Security in a Multi-Perimeter World by IBM

December 31, 2012 - (Free Research)
Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise. 
(WEBCAST) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 31, 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Mobile Challenge on the Mainframe by IBM

October 17, 2013 - (Free Research)
This whitepaper examines the effect that mobile or Bring Your Own Devices (BYOD) have on enterprises, and how company mainframe can help support development, management, and security with its processing power. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Managing and Understanding Mobile Authentication by SearchSecurity.com

July 12, 2013 - (Free Research)
In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies. 
(EBOOK) READ ABSTRACT |

Cloud IAM: Is it worth the move? by SearchSecurity.com

February 13, 2012 - (Free Research)
As cloud adoption increases, managers are beginning to consider integrating their IAM infrastructure into cloud architectures. In this e-guide, gain expert insight into cloud IAM including how to use a IAM Maturity model to improve IAM strategy, key considerations before moving to a cloud-based service and much more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 07, 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

E-Guide: Are 'strong authentication' methods strong enough for compliance? by SearchSecurity.com

September 26, 2011 - (Free Research)
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 422 | Next Page

> Explore alternative searches for: Access Control

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts