IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed    Add to Google    Add to My Yahoo!
ACLs White Papers (View All Report Types)
 
The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Definitive Guide to Next Generation Network Access Control
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

ForeScout Technologies, Inc.

Dell Mobile Clinical Computing - AlwaysOn Point of Care
sponsored by Dell and VMware
WHITE PAPER: This resource discusses why modernization of the point-of-care desktop has become an urgent health IT priority. Inside, learn how the right virtualization architecture can give caregivers the information access and protection that they need.
Posted: 11 Jun 2013 | Published: 31 Dec 2012

Dell and VMware

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement