IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists White Papers (View All Report Types)
 
Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER: In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

Case Study: Essent Deploys API Gateway
sponsored by Axway
WHITE PAPER: Essent, the largest energy company in the Netherlands, needed to provide an easy-to-use, secure, robust, and proven system to enable web services and mobile applications for customers, partners, employees, and the general public. Access this case study to find out which API platform Essent deployed to govern the flow of data on the edge.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Axway

IAM: The New Security Perimeter
sponsored by IBM
WHITE PAPER: Access this white paper to explore how IAM platforms reduce risk and keep unknown users and hackers out of your network.
Posted: 25 Mar 2015 | Published: 05 Nov 2013

IBM

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Safeguard Business-Critical Resources with a Comprehensive Imaging and Printing Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

The Future of Data Security: A Zero Trust Approach
sponsored by IBM
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

IBM

Compliance and Security for Healthcare Providers Driving Access and Efficiency through User Context
sponsored by RES Software
WHITE PAPER: This white paper describes software that helps you speed and personalize access to applications and services throughout the organization without sacrificing privacy, security, and compliance.
Posted: 19 Mar 2015 | Published: 08 Jan 2015

RES Software

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement