IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists White Papers (View All Report Types)
 
Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Preventing Insider Cyber Attacks
sponsored by IBM
WHITE PAPER: Access this white paper to learn how one identity and access management platform enables you to view all user activity and mitigate internal and external breach risk.
Posted: 27 Feb 2015 | Published: 17 Sep 2014

IBM

SAML Identity Federation: Security for an Increasingly Connected World
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language - SAML. It describes why standards like SAML are necessary for implementing federated identity across organizations.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
sponsored by Ping Identity Corporation
WHITE PAPER: Ping Identity is working hard to deliver what they believe to be the best solutions for securing and streamlining identity management for business-critical applications, especially those in the cloud.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

Ping Identity Corporation

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Definitive Guide to Next Generation Network Access Control
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

ForeScout Technologies, Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement