Access LayerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Layer returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Network Management
 •   Networks
 •   Access Control
 •   Application Security
 •   Wireless Security
 •   Data Security
 •   Endpoint Security
 •   Authentication / Password Management
 •   Application Management and Maintenance

Related Searches
 •   Access Layer Licenses
 •   Access Layer Service
 •   Access Layer Systems
 •   Access Search
 •   Access Spreadsheets
 •   Basic Access Layer
 •   Codes Access
 •   Financial Access Layer
 •   India Access Layer
 •   Process Access
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Airport's Common Use Model Relies on Modular Switches by Cisco Systems, Inc.

January 12, 2009 - (Free Research)
Read how the Greater Toronto Airports Authority adopted Cisco Catalyst 6500 switches in the wiring closet and throughout the network to enable the convergence of data, voice, and video, and provide virtualization to support a Common Use environment. 
(CASE STUDY) READ ABSTRACT |

Simpler Database Migrations Have Arrived! IBM, ANTs Software, And EnterpriseDB Offer Innovative New Options by IBM

June 06, 2011 - (Free Research)
Application developers and DBAs looking to migrate databases due to cost concerns, staffing problems, or technology issues should consider this new database compatability layer option to mitigate risk, lower migration cost, and speed the migration process. 
(WHITE PAPER) READ ABSTRACT |

Data Virtualization Unifies Data Access for Actionable BI and Agile Processes by Denodo Technologies

July 15, 2011 - (Free Research)
A unified data access layer using data virtualization provides agile data services that can deliver BI to business processes. Companies with traditional BI installations disconnected from business processes lack this agility. BI/Analytics needs to be agile and more actionable in the context of business processes to realize maximum benefits. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

Secure Unified Access with Cisco Catalyst 2960-X and 2960-XR Series Switches by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the security benefits of an industry leader's networking switch technology. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Virtual Infrastructure Management by Brocade

June 11, 2010 - (Free Research)
While virtualization offers many significant technical and business benefits, it comes with some formidable IT management challenges. Discover the three best practices that IT leaders are following to ensure they get the most value from this dynamic, flexible, and application-centric technology. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Virtual Infrastructure Management by Brocade

January 28, 2010 - (Free Research)
By understanding the unique management challenges of virtualized environments and leveraging innovative solutions to meet those challenges, you will be able to help your organization reap the wide range of business benefits that virtualization can deliver. 
(WHITE PAPER) READ ABSTRACT |

The Intelligent Campus LAN by Juniper Networks, Inc.

March 27, 2012 - (Free Research)
Access this Tech Guide from SearchNetworking.com to learn how you can update your campus LAN to address the modern needs of your network, including application delivery and mobility. 
(EGUIDE) READ ABSTRACT |

Cisco Catalyst 3750 Series Switches by Cisco Systems, Inc.

The Cisco Catalyst 3750 Series Switch is an innovative product for midsize organizations and enterprise branch offices. 
(HARDWARE PRODUCT)

Application Brief: Virtual Firewall and Secure Access Gateway by Vyatta Inc.

April 11, 2011 - (Free Research)
Vyatta delivers the only multi-layer virtual network security solution that maintains compliance and enables instant migration of complex, layered firewall architectures from the physical network into any virtual data center, without compromises. 
(APPLICATION NOTE) READ ABSTRACT |

Data Abstraction Best Practices by Composite Software

March 31, 2011 - (Free Research)
Data abstraction overcomes data structure incompatibility by transforming data from its native structure and syntax into reusable views and data services. But some data abstraction approaches work better than others. Composite data virtualization is an optimal way to implement an abstraction layer at enterprise scale. 
(WHITE PAPER) READ ABSTRACT |

Entrust IdentityGuard for Enterprise by Entrust, Inc.

January 01, 2007 - (Free Research)
As an established global leader in layered security strategies, Entrust offers a cost-effective versatile authentication platform that can help organizations protect the identities of employees and partners accessing sensitive enterprise data. 
(WHITE PAPER) READ ABSTRACT |

The Key to Seamless SSO by Radiant Logic, Inc.

April 10, 2014 - (Free Research)
This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection. 
(WHITE PAPER) READ ABSTRACT |

Identity-Aware Networking by Extreme Networks (E-mail this company)

December 02, 2010 - (Free Research)
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Presentation Transcript: Layering Enterprise Security with Next Generation Access Management by Oracle Corporation

January 14, 2009 - (Free Research)
Read this paper to learn more about the current state of security and identity management. The presenters discuss solutions related to enterprise security issues and the benefits of Oracle products. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PhoneFactor Case Study: Fredrikson & Byron, P.A. by PhoneFactor

April 11, 2013 - (Free Research)
Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information. 
(CASE STUDY) READ ABSTRACT |

How SSL and TLS Secure Network Transactions by GeoTrust, Inc.

December 20, 2012 - (Free Research)
This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Yellowfin Business Intelligence 4.0 by Yellowfin

March 20, 2009 - (Free Research)
Yellowfin lowers the complexity of your reporting environment. Yellowfin has been specifically designed to enable end users to easily create and access reports via a browser. 
(TRIAL SOFTWARE) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 10, 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

About the 10 Gigabit Ethernet Standard by Dell, Inc. and Intel®

March 12, 2012 - (Free Research)
Access this resource to learn more about the 10 Gigabit Ethernet Standard, including layer specifications, Serial LAN PHY, Serial WAN PHY, 10GbE Physical media dependent interfaces, and more! 
(WHITE PAPER) READ ABSTRACT |

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution by F5 Networks

August 06, 2013 - (Free Research)
This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications. 
(WHITE PAPER) READ ABSTRACT |

Securely Publish and Manage Web APIs with CloudControl by Layer 7 Technologies

July 20, 2011 - (Free Research)
Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs. 
(PRODUCT OVERVIEW)

Demystifying Switch-based ACLs by Global Knowledge

February 14, 2013 - (Free Research)
This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

A Layered Approach to Securing Remote Maintenance Consoles by Raritan Inc.

January 2008 - (Free Research)
Existing techniques for accessing maintenance consoles are inefficient and leave security holes in the network. Learn how, by deploying a secure console server, maintenance consoles can be secured and the availability of the network improved. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts