Controls User ProfileWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Controls User Profile returned the following results.
RSS What is RSS?
Related Categories

 •   Identity Management/ User Provisioning
 •   Data Security
 •   Access Control
 •   Security Policies
 •   Virtualization
 •   Security Monitoring
 •   Application Security
 •   Endpoint Security
 •   Network Security
 •   Authentication / Password Management

Related Searches
 •   Controls Protocol
 •   Controls User Pennsylvania
 •   Controls User Profile Indiana
 •   Controls User Profile Schedules
 •   Graph Controls
 •   Measurement Of Controls User Profile
 •   Methodology Controls
 •   On-Line Controls
 •   Professional Controls User Profile
 •   Tool Controls User
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

To Block or Not. Is that the Question? by Palo Alto Networks

December 01, 2009 - (Free Research)
This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement. 
(WHITE PAPER) READ ABSTRACT |

The Role of Identity & Access Management in Achieving Continuous Compliance by CA Technologies.

February 01, 2012 - (Free Research)
A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform. 
(WHITE PAPER) READ ABSTRACT |

Reclaim Wasted Capacity by Northern Parklife

August 03, 2009 - (Free Research)
This four-part webcast demonstrates the necessity for a proper storage management solution, such as Northern Storage Suite, in an organization's storage infrastructure. They'll review how NSS can reclaim wasted capacity, control user behavior, getting your end-users on-board with saving capacity and how to properly plan for future storage needs. 
(VIDEO) READ ABSTRACT |

The Consumerization of IT: Security Challenges of the New World Order by CA Technologies.

May 31, 2012 - (Free Research)
Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them. 
(WHITE PAPER) READ ABSTRACT |

Check Point Abra: A Virtual Secure Workspace by Check Point Software Technologies Ltd.

June 28, 2010 - (Free Research)
Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints. 
(WHITE PAPER) READ ABSTRACT |

The Security Risks Exposed by Sharepoint Search by Dell Software

September 20, 2013 - (Free Research)
This whitepaper features a breakdown of the security risks that come with search in SharePoint 2013 and how to deal with them. 
(WHITE PAPER) READ ABSTRACT |

Daily Active Directory Administration: Simplified, Streamlined - and Successful by Dell Software

October 02, 2009 - (Free Research)
In this Quest white paper, learn how automating AD improves your efficiency and reduces mistakes, helping you to break free from the headaches and the daily AD grind. Read this white paper today. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Overcoming CIO Challenges in Global Mobility Management by BlackBerry

July 01, 2009 - (Free Research)
This paper looks at some of the challenges that CIOs are facing in managing mobility. This is clearly becoming more complex for large enterprises as mobility penetrates more deeply into their organizations, driven by changing working practices and supported by rapidly evolving technology. 
(WHITE PAPER) READ ABSTRACT |

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies.

June 01, 2010 - (Free Research)
Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.  
(WHITE PAPER) READ ABSTRACT |

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies

June 01, 2010 - (Free Research)
Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
(WHITE PAPER) READ ABSTRACT |

Internet Security Census 2013 by Fortinet, Inc.

December 31, 2013 - (Free Research)
This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Virtualization in the Data Center by Force10 Networks

April 01, 2007 - (Free Research)
Data center networking must change with the implementation of server virtualization. This white paper provides best practices for building a network architecture in a virtual environment and offers tips on advanced Ethernet witch/routers and more. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 29, 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

E-Guide: IAM in the cloud by CA Technologies.

December 22, 2011 - (Free Research)
When bringing your organization into the cloud, there are a few steps that need to be taken in order to ensure security. One of the main areas that needs to be appropriately integrated is identity management. Read this expert E-Guide and discover how to manage identity in the cloud, along with whom and what you can trust in the cloud. 
(EGUIDE) READ ABSTRACT |

AppSense The Low down: What does user virtualization boil down to? by AppSense

June 07, 2011 - (Free Research)
Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation. 
(PRODUCT OVERVIEW) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 01, 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 08, 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 03, 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 13, 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 01, 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

User Virtualization and Windows 7: Migration, personalization, satisfaction by AppSense

June 08, 2011 - (Free Research)
Windows 7 will soon be the preferred organisational operating system, and the migration could cause difficulty. Read now to discover how user virtualisation will automate the process of migrating and managing thousands of user profiles and endpoint devices. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 21, 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The State of System i Security 2008 by PowerTech

August 2008 - (Free Research)
This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command by PowerTech

October 2009 - (Free Research)
When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts