IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access ControlWhite Papers (View All Report Types)
26 - 50 of 343 Matches Previous Page  | Next Page
Improve IT maturity to accelerate your move to cloud computing
sponsored by IBM
WHITE PAPER: This whitepaper examines the endpoint management capabilities required to simplify the delivery of IT capacity, enhance patch management for virtualized systems, speed the delivery of IT-services and improve information access.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

IBM

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

When Millions Need Access: Identity Management in an Interconnected World
sponsored by IBM
WHITE PAPER: This whitepaper covers an automation solution that will allow you to monitor the ever-growing number of access points to your organization's sensitive data.
Posted: 06 Mar 2014 | Published: 13 Feb 2013

IBM

Five Reasons It’s Time For Secure Single Sign-On
sponsored by Ping Identity Corporation
WHITE PAPER: Access this informative resource to uncover five reasons why your organization should consider secure SSO.
Posted: 06 Mar 2014 | Published: 31 Jul 2013

Ping Identity Corporation

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Analyst Report: The User Administration and Provisioning Market
sponsored by Dell Software
WHITE PAPER: This Magic Quadrant report from the independent analysts at Gartner, Inc. focuses on the leading vendors and offerings in the User Administration and Provisioning (UAP) market. Read on to uncover the strengths and weaknesses of 16 UAP providers.
Posted: 21 Feb 2014 | Published: 21 Jan 2013

Dell Software

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Managing Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data.
Posted: 18 Feb 2014 | Published: 31 Dec 2011

IBM

Licensing: The Next Great Disruptor to the Data Protection Status Quo
sponsored by Asigra
WHITE PAPER: Download this report to learn how recovery-centric licensing can benefit your organization.
Posted: 14 Feb 2014 | Published: 31 Jul 2013

Asigra

Making Smarter Mobile Access Decisions
sponsored by Dell Software
WHITE PAPER: Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Dell Software

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

How to Reduce the Cost and Complexity of Two Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: Access this resource to explore key practices for combatting complexity and high cost challenges with two-factor authentication.
Posted: 03 Feb 2014 | Published: 30 Sep 2012

Celestix Networks

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Single Sign On and Web Access Control Made Easy
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a unified, integrated identity and access management (IAM) system that uses a service oriented architecture (SOA) stack feature to simplify web access security for on- and off-premise applications.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

OpenIAM

Mobilizing Windows applications
sponsored by Citrix
WHITE PAPER: This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Integrating Microsoft Technologies with an Identity and Access Management Solution
sponsored by OpenIAM
WHITE PAPER: In this whitepaper, learn how one comprehensive identity and access management (IAM) solution can be easily integrated with your existing Microsoft technologies, as well as non-Microsoft tools.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

OpenIAM

Cost-effective, Compliance-ready Open-source Identity Management
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a scalable, cost-effective identity management solution that improves risk management, end-user efficiency, and facilitates regulatory compliance.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

OpenIAM

Next-generation Firewalls Enable Secure Mobile Network Access
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM
26 - 50 of 343 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement