IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed    Add to Google    Add to My Yahoo!
Privileges White Papers (View All Report Types)
 
Data Management Designed for the Web, Mobile and Internet of Things Era
sponsored by IBM
WHITE PAPER: Database-as-a-Service (DBaaS) helps enable you to buy into a data management Service Level Agreement (SLA) instead of buying into a database technology, simplifying app development and delivery.Read this white paper to find out all the ways DBaaS can benefit your organization.
Posted: 06 Apr 2015 | Published: 31 Jan 2015

IBM

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Reducing the Costs of IT Security Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.
Posted: 12 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

The Case for Risk-Based, Business-Aligned Internal Audit
sponsored by RSA
WHITE PAPER: The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

RSA

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012

Zenprise

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Preventing Data Breaches in Privileged Accounts Using Access Control
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper explores insider attacks, threats and risks involved across every enterprise. Also, we will recommend a sound, cost-saving solution to prevent a disaster from happening to a company's financial assets and reputation using access control.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

BeyondTrust Corporation

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement