IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed    Add to Google    Add to My Yahoo!
ACLs Reports
 
Making Big Data Accessible, Actionable and Affordable
sponsored by Kofax, Inc.
WHITE PAPER: Read this white paper for use cases of real-world customers who are reaping benefits from big data that was once almost impossible to access. Learn how your organization can also harness this data from internal and external sources and put it in the hands of business users rapidly and cost-effectively.
Posted: 06 May 2015 | Published: 31 Oct 2013

Kofax, Inc.

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

An Inside Look at the Azure Active Directory
sponsored by Microsoft
VIDEO: In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD
Posted: 01 May 2015 | Premiered: 01 May 2015

Microsoft

The Evolution of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.
Posted: 05 May 2015 | Published: 04 Dec 2014

RSA

The Essential Guide to Privileged Activity Monitoring
sponsored by BalaBit
WHITE PAPER: In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

BalaBit

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER: In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Centricity™ Cardio Enterprise Solution for the Echo Lab
sponsored by GE Healthcare
WHITE PAPER: Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.
Posted: 04 May 2015 | Published: 04 May 2015

GE Healthcare

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement