IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Policies White Papers (View All Report Types)
 
Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This helpful infographic lists 7 rules for protecting your organization from external threats targeting your high-value applications and data.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

The Three Phases of Securing Privileged Accounts- A Best Practices Guide
sponsored by Cyber-Ark Software
WHITE PAPER: This helpful white paper explains exactly how privileged account security works, and outlines the best practices for implementing it for your organization.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cyber-Ark Software

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement