IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control White Papers (View All Report Types)
 
How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Password Hacking: Are You Safer in the Cloud?
sponsored by Dashlane Inc.
WHITE PAPER: This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.
Posted: 15 Dec 2015 | Published: 08 Dec 2015

Dashlane Inc.

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

IAM for Web Resources and APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you how to harness open standards like SAML to enable secure web SSO, protect APIs, and provide dynamic session management to employees.
Posted: 28 Oct 2015 | Published: 17 Jun 2015

Ping Identity Corporation

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Buyer's Guide: Select the Right Solution for Identity and Access Assurance
sponsored by IBM
WHITE PAPER: Consult this buyer's guide to help you select the right technology for identity and access assurance -- one that will control access within, across, and between businesses.
Posted: 06 May 2014 | Published: 30 Apr 2013

IBM

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement