IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists Reports
 
Compliance and Security for Healthcare Providers Driving Access and Efficiency through User Context
sponsored by RES Software
WHITE PAPER: This white paper describes software that helps you speed and personalize access to applications and services throughout the organization without sacrificing privacy, security, and compliance.
Posted: 19 Mar 2015 | Published: 08 Jan 2015

RES Software

A Clear View into User Activities with Identity Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an identity intelligence platform that can help better manage and secure users as a key line of defense across infrastructure perimeters.  Additionally, view now to read several case stories of organizations who have had success with this identity intelligence platform.
Posted: 25 Feb 2015 | Published: 17 Sep 2014

IBM

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Case Study: Essent deployes API Gateway
sponsored by Axway
WHITE PAPER: Essent, the largest energy company in the Netherlands, needed to provide an easy-to-use, secure, robust, and proven system to enable web services and mobile applications for customers, partners, employees, and the general public. Access this case study to find out which API platform Essent deployed to govern the flow of data on the edge.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Axway

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

State of IAM: Cloud and Mobile Technologies Expose Security Cracks
sponsored by SailPoint Technologies
WHITE PAPER: In this white paper, uncover the security cracks of mobile and cloud computing that IAM has exposed. View now to explore the state of IAM technology and what you can do to strengthen your strategy. Learn how to protect your data from external and internal threats with proper provisioning and administration controls.
Posted: 23 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement