IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed    Add to Google    Add to My Yahoo!
Privileges White Papers (View All Report Types)
 
Database Management Designed for the Web, Mobile and Internet of Things Era
sponsored by IBM
WHITE PAPER: Database-as-a-Service (DBaaS) helps enable you to buy into a data management Service Level Agreement (SLA) instead of buying into a database technology, simplifying app development and delivery. Read this white paper to find out all the ways DBaaS can benefit your organization.
Posted: 06 Apr 2015 | Published: 31 Jan 2015

IBM

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Reducing the Costs of IT Security Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.
Posted: 12 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco

Enterprise Remote Access
sponsored by F5 Networks
WHITE PAPER: Historically, organizations have used IPSec VPN solutions to provide employees with remote access to network resources; an expensive, complicated deployment for a handful of users. This paper details how this process has modernized.
Posted: 28 Apr 2008 | Published: 01 Sep 2005

F5 Networks

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement