Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Network Access Control Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Access Control Software White Papers (View All Report Types)
 
ESG: A Phased Approach to Network Access Control (NAC)
sponsored by Symantec Corporation
WHITE PAPER: Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER: Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Securing Virtualised Environments and Accelerating Cloud Computing
sponsored by CA Technologies
WHITE PAPER: There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
Posted: 01 Jun 2010 | Published: 01 May 2010

CA Technologies

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER: SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement