Access RoleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Role returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Identity Management/ User Provisioning
 •   Security Policies
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Data Security
 •   Authentication / Password Management
 •   Application Security
 •   Endpoint Security

Related Searches
 •   Access Customer
 •   Access Planner
 •   Access Role Check
 •   Access Role Industries
 •   Access Role Reports
 •   Access Role Specialist
 •   Access Role Specialists
 •   Questions About Access Role
 •   Researching Access
 •   View Access
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Role Based Access Control and Entitlement Management by FoxT

September 30, 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

Role-Based Access Control in Avaya Aura by Global Knowledge

March 15, 2013 - (Free Research)
Take an in-depth look at how to improve role-based access control and review the process for creating and assigning new user-roles on this advanced communications systems management tool. Learn more about how it can help enhance collaboration in your enterprise today. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 31, 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Achieving compliance through IAM by SearchSecurity.com

December 22, 2011 - (Free Research)
Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations. 
(EGUIDE) READ ABSTRACT |

Managing Identities and Access Control by SearchSecurity.com

February 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

The Role of Remote Management in Assuring IT Infrastructure Uptime by Raritan Inc.

January 2008 - (Free Research)
This white paper explores the role of remote management in ensuring IT infrastructure uptime and provides an in-depth explanation of the advantages and disadvantages of in-band tools, the operational advantages of remote management, and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Accelerating Return-On-Investment with Roles Management by Oracle Corporation

February 2009 - (Free Research)
This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control by Sun Microsystems, Inc.

July 2008 - (Free Research)
This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack. 
(WHITE PAPER) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

Optimizing Microsoft Exchange in the Enterprise: Optimizing the Mailbox Server Role and the Client Access Server by Global Knowledge

January 2013 - (Free Research)
Access part one in a two part series on optimizing Exchange Server 2010 in the enterprise. Uncover details about the advanced features of the mailbox and client access servers along with simple tips and tricks for improving your Exchange environment. 
(WHITE PAPER) READ ABSTRACT |

Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption by Imprivata

April 2011 - (Free Research)
This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray. 
(WHITE PAPER) READ ABSTRACT |

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks? by CA Technologies.

February 2012 - (Free Research)
Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency. 
(WHITE PAPER) READ ABSTRACT |

The Role of Identity & Access Management in Achieving Continuous Compliance by CA Technologies.

February 2012 - (Free Research)
A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform. 
(WHITE PAPER) READ ABSTRACT |

Do Mobile Users Need Full Desktop Access? by VMware, Inc.

August 2013 - (Free Research)
In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future. 
(EGUIDE) READ ABSTRACT |

CA Identity Lifecycle Management Solution Implementation: Implement an Effective Identity Lifecycle Management Solution by CA Technologies.

April 2009 - (Free Research)
The CA Identity Lifecycle Management Solution Implementation deploys CA Identity Manager and/or CA Role & Compliance Manager in 60-day engagement phases for rapid time-to-value. Read this paper for details and learn if this solution is right for your company. 
(DATA SHEET) READ ABSTRACT |

Increase productivity and security with identity and access management by IBM

March 2013 - (Free Research)
In this white paper, explore new, updated techniques for complex identity management in the cloud, aimed at improving productivity and better securing privileged information. 
(WHITE PAPER) READ ABSTRACT |

Stopping Privilege Creep: Limiting User Privileges with Access Reviews by SearchSecurity.com

July 2013 - (Free Research)
This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more! 
(EGUIDE) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Information Security Roles and Responsibilities Made Easy by Information Shield, Inc.

Reducing the total cost of information security services by properly documented roles and responsibilities. 
(SOFTWARE PRODUCT)

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems by IBM

September 2013 - (Free Research)
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts