IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control ListsReports
 
Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
BROCHURE: This brochure explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

Baffled by managing digital identity?
sponsored by ComputerWeekly.com
RESOURCE: Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Using an IAM maturity model to hone identity and access management strategy
sponsored by IBM
EGUIDE: In this expert e-guide, Forrester Research's Andras Cser discusses how to use an IAM maturity model to assess your identity and access management strategy
Posted: 10 Sep 2014 | Published: 10 Sep 2014

IBM

Cloud IAM catching on in the enterprise
sponsored by IBM
EGUIDE: This expert e-guide explains why the market for cloud-based IAM is growing.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA, The Security Division of EMC

Top 5 Requirements for Today’s NGFW
sponsored by Fortinet, Inc.
VIDEO: Popular data breaches like those at eBay and Monsanto have led to an increasing desire among organizations to leverage next generation firewalls. This webinar explains the top drivers, features, and decision criteria for these firewalls.
Posted: 30 Jul 2014 | Premiered: 06 Jun 2014

Fortinet, Inc.

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement