Access MaintainWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Maintain returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Network Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Identity Management/ User Provisioning
 •   Application Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring

Related Searches
 •   Access Activities
 •   Access Maintain Device
 •   Access Maintain Equipment
 •   Access Maintain Organizational
 •   Access Maintain Tool
 •   Access Maintain Wyoming
 •   Access Print
 •   Audits Access Maintain
 •   Configure Access Maintain
 •   Data Access
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security? by CA Technologies.

May 15, 2012 - (Free Research)
Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

The Impact of Carrier Ethernet on Service Providers by Dorado Software

September 21, 2009 - (Free Research)
Mobile internet access and the explosive demand for high bandwidth services on mobile devices have created a pivotal point for service providers. Those providers that can meet the new demands while increasing efficiency will be able to increase their market share, while those that are not will lose ground. Read on to learn how to keep up. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI compliance with Dell SecureWorks' security services by Dell, Inc.

May 18, 2011 - (Free Research)
It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance. 
(WHITE PAPER) READ ABSTRACT |

Data Center Facilities Design for IT E-book: Chapter 2 by Schneider Electric

August 11, 2011 - (Free Research)
Access this expert resource from our editors to discover proven strategies for maintaining a healthy and efficient data center climate, starting with how to keep IT equipment cool. 
(EBOOK)

Breaking the Scalability Barrier with Infinite Cache by EnterpriseDB Corporation

September 22, 2009 - (Free Research)
Infinite Cache™ from EnterpriseDB revolutionizes distributed cache management on commodity blade server hardware by substantially increasing the amount of memory available to hold data including entire databases with outstanding performance. 
(WHITE PAPER) READ ABSTRACT |

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data by AvePoint, Inc.

February 04, 2010 - (Free Research)
The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss. 
(CASE STUDY) READ ABSTRACT |

IT Handbook: Security Best Practices for Server Virtualization by Intel

August 09, 2011 - (Free Research)
Without the right plan for managing security, much of your proprietary data and  information is at great risk. Access this expert resource, from the editors at SearchServerVirtualization.com, to learn the essential best practices for maintaining security in your virtualized data center. 
(EBOOK)

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 19, 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Log Management Tightens Data Security, Performance by SearchCompliance.com

April 23, 2013 - (Free Research)
For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance. 
(EBOOK) READ ABSTRACT |

The CISO's Guide to a Full Night's Sleep by EMC Corporation

April 10, 2014 - (Free Research)
This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance. 
(WHITE PAPER) READ ABSTRACT |

World Wide Technology Accelerates and Streamlines Access Management by NetIQ

March 31, 2014 - (Free Research)
This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere. 
(WHITE PAPER) READ ABSTRACT |

MDM is Not Enough - Secure Mobile File Sharing with Acronis Access by Acronis

March 18, 2014 - (Free Research)
This informative webcast examines a file syncing and sharing solution that allows mobile workers to share and access the applications and data they need to be productive and efficient while maintaining the highest levels of enterprise security. 
(WEBCAST) READ ABSTRACT |

When millions need access: Identity management in an increasingly connected world by IBM

January 03, 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 31, 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

Managing Identities and Access Control by SearchSecurity.com

February 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

The Role of Identity & Access Management in Achieving Continuous Compliance by CA Technologies.

February 01, 2012 - (Free Research)
A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

Seamless Design and GIS Integration by Autodesk

July 2008 - (Free Research)
With Autodesk Map 3D and Oracle Spatial forming the core of its GIS, Tacoma's efforts have met with spectacular-and award-winning-success. 
(CASE STUDY) READ ABSTRACT |

How can I Adopt Cloud Computing While Maintaining Strong Security? by CA Technologies.

September 2010 - (Free Research)
Whether an organization is looking to provide or consume private, public, hybrid or community cloud services, security and control requirements must be addressed. Read this executive brief to learn how to secure your business in the cloud by using identity and access management. 
(WHITE PAPER) READ ABSTRACT |

802.1X: Port-Based Authentication Standard for Network Access Control (NAC) by Juniper Networks, Inc.

March 2007 - (Free Research)
This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts