IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists Reports
 
Migrate Without Pain: Replace Your Aging LDAP Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a method for migrating away from LDAP that's easy, efficient, and risk-free.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Radiant Logic, Inc.

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016

Microsoft

Your Guide to the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

How to Integrate Siloed Identities and Data
sponsored by Radiant Logic, Inc.
WHITE PAPER: This comprehensive white paper digs into the current fragmented landscape of identity infrastructures. Read on for expert tips on integrating identities and data out of silos.
Posted: 14 Dec 2015 | Published: 31 Dec 2012

Radiant Logic, Inc.

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

DataWorks Solution Brief
sponsored by IBM
WHITE PAPER: 42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.
Posted: 09 Jun 2016 | Published: 31 Dec 2015

IBM

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement