User ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: User Control returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Security Policies
 •   Identity Management/ User Provisioning
 •   Network Security
 •   Security Monitoring
 •   Data Security
 •   Application Security
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance

Related Searches
 •   India User Control
 •   Supply User Control
 •   User Configuration
 •   User Control Cases
 •   User Control Demonstration
 •   User Control Equipment
 •   User Control Uk
 •   User Employee
 •   User Illinois
 •   User Researching
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 12, 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Buy Microsoft Office 365 Trial Download by Microsoft

August 02, 2012 - (Free Research)
See the familiar software features of next-generation communications to deliver the power of cloud computing and download this trial of Microsoft Office 365. 
(DOWNLOAD)

Building Secure Private Clouds with VMware vCloud Director by VMware, Inc.

April 25, 2011 - (Free Research)
VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services. 
(WEBCAST) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 31, 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

Managing Private Clouds by Red Hat

December 02, 2013 - (Free Research)
This whitepaper details the importance of striking a balance with your cloud computing model and covers a solution that can help. 
(WHITE PAPER) READ ABSTRACT |

Enterprise-Grade Management for Amazon Web Services (AWS) by Red Hat

April 08, 2014 - (Free Research)
This whitepaper covers a set of management and automation tools that will give you advanced management capabilities in a hybrid cloud environment. 
(WHITE PAPER) READ ABSTRACT |

Regain Visibility and Control with Cost-effective Next-generation Security by Palo Alto Networks

August 31, 2013 - (Free Research)
This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Access Control in Virtual Environments by FoxT

June 2008 - (Free Research)
The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

How to Regain IT Control in an Increasingly Mobile World by BlackBerry

July 2012 - (Free Research)
Learn how to balance IT control and the end user experience while managing the data control problem brought on by today's increasingly mobile world in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Managing Identities and Access Control by SearchSecurity.com

February 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Controlling and Managing Superuser Access by Dell Software

December 2011 - (Free Research)
"Super users" – those people with greater access and rights – is a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Discover the risks associated with privileged accounts and how to mitigate them. Read "Controlling and Managing Super User Access" 
(WHITE PAPER) READ ABSTRACT |

When millions need access: Identity management in an increasingly connected world by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Is your user management process getting you down? Improving efficiency and security through automation by NetIQ Europe

May 2011 - (Free Research)
Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access. 
(WHITE PAPER) READ ABSTRACT |

Privileged user management: It's time to take control by CA Technologies

October 2009 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Dilemma: Liberty vs. Lockdown by Bit9, Inc.

June 2009 - (Free Research)
CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts