IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control White Papers (View All Report Types)
Database Security: Protect your Business Reputation
sponsored by Oracle Corporation
WHITE PAPER: This report discusses how to prevent data misuse or theft with better access control and privilege management for your databases.
Posted: 28 Oct 2015 | Published: 31 Jan 2015

Oracle Corporation

Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014


Stopping Cybercrime: A Guide for the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper contains a list of best practices financial institutions can follow to ensure that they remain secure in the face of growing cyber-attacks.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

LogRhythm, Inc.

Dow Corning Uses Classifications Labels to Help Protect Intellectual Property
sponsored by TITUS
WHITE PAPER: This short case study shows how one multinational company deployed an enterprise-wide classification management system which had the power to easily control document access.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014


Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014


Enabling Mobility without Compromising Security
sponsored by Dell Software
WHITE PAPER: This white paper examines the top 5 mobile security challenges and introduces a model that charts the benefits and risks of various mobile access approaches.
Posted: 29 May 2015 | Published: 20 May 2015

Dell Software

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014

JAMF Software

The Essential OAuth Primer - Understanding OAuth for Securing Cloud APIs
sponsored by Ping Identity Corporation
WHITE PAPER: In order to create a consistent, flexible identity and policy architecture for web apps, services, devices, and desktop clients attempting to communicate with cloud APIs, you need to eliminate the password anti-pattern. This white paper explores one such approach in depth - view now to learn if it lives up to its promises.
Posted: 26 Oct 2015 | Published: 14 May 2014

Ping Identity Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement