IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access Control Multimedia (View All Report Types)
 
Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Three Key Areas for Improving your Compliance Programs
sponsored by CA Technologies.
PODCAST: This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.
Posted: 24 Nov 2010 | Premiered: Oct 21, 2010

CA Technologies.

Cisco Secure Remote Access Solution
sponsored by Cisco Systems, Inc.
SOFTWARE DEMO: This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
Posted: 08 Jul 2008 | Premiered: 01 Jul 2008

Cisco Systems, Inc.

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement