IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists Reports
 
IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

An Overview of the Privileged Identity Management Market
sponsored by CA Technologies
ANALYST REPORT: This report examines nine current PIM vendors, based on 18 key criteria, to help you determine which best fits your enterprise's security needs. Access this report to see which vendors offer cloud, hypervisor support, and behavioral analytics in their range of features.
Posted: 22 Aug 2014 | Published: 03 Feb 2014

CA Technologies

Hacker Survey Report: The Flaws in IAM
sponsored by Thycotic
WHITE PAPER: In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.
Posted: 04 Jan 2016 | Published: 30 Dec 2015

Thycotic

INTEGRIS Health Turns to Streamline Linux Server Management and Mitigate System Vulnerabilities
sponsored by FoxT
CASE STUDY: Uncover how INTEGRIS Health, Oklahoma's largest health system of 9,000 employees, accelerated deployment of users and user groups onto their Linux servers and reduces time to give users privileged access.
Posted: 22 Dec 2015 | Published: 16 Dec 2015

FoxT

Enhacing IAM and Authentication with Threat Intelligence
sponsored by SecureAuth
WHITE PAPER: What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.
Posted: 18 Jan 2016 | Published: 17 Nov 2015

SecureAuth

Preventing Attacks Before They Happen
sponsored by Check Point Software Technologies Ltd.
EGUIDE: While no antimalware product will ever be 100% effective, there are solutions that can successfully ward off advanced attacks. This expert guide gives advice for finding the best solution for your environment.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Check Point Software Technologies Ltd.

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Configuration Management: Puppet or Chef?
sponsored by FoxT
WHITE PAPER: This white paper pits Puppet against Chef and brings the shortcomings of each to light to help your organization decide which strategy is right for your IAM needs.
Posted: 22 Dec 2015 | Published: 04 Dec 2015

FoxT

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement