IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists Multimedia (View All Report Types)
 
Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

Secure Cloud Access Reference Architecture Model
sponsored by Intel
WEBCAST: Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.
Posted: 10 May 2011 | Premiered: May 10, 2011

Intel

Remote Replication of an Oracle 10g Database Using Continuous Access/EVA
sponsored by Hewlett Packard Enterprise
WEBCAST: View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
Posted: 24 Oct 2007 | Premiered: Jul 12, 2007, 11:00 EDT (15:00 GMT)

Hewlett Packard Enterprise

Closing the Loop for Effective Network Operations Management Webcast
sponsored by Cisco Systems, Inc.
WEBCAST: This webcast explores the need for operational efficiency in the modern enterprise and why network monitoring and management is so vital. View now to uncover details of a portfolio of networking products that can help you with network visibility, troubleshooting, and more!
Posted: 29 Jun 2012 | Premiered: May 15, 2012

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement