IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control Lists Reports
Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014


Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Identity and Access Management Users Maximize Their ROI
sponsored by ForgeRock
WHITE PAPER: Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Stopping Cybercrime: A Guide for the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper contains a list of best practices financial institutions can follow to ensure that they remain secure in the face of growing cyber-attacks.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

LogRhythm, Inc.

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

7 Cloud Security Risks That Will Ruin Your Day
sponsored by Intel and IBM
EGUIDE: This expert e-Guide presents today's top 7 cloud security risks that challenge organizations.
Posted: 29 Sep 2015 | Published: 09 Sep 2015

Intel and IBM

Choosing an IAM architecture
sponsored by ForgeRock
EGUIDE: Today, there are two schools of IAM thought: provider-centric and user-centric, each with their own set of merits. But which is right for your organization? Does it matter? This expert e-guide reviews the two approaches to help you in your search for choosing the ideal IAM architecture.
Posted: 24 Nov 2015 | Published: 19 Nov 2015


Forging a New Future with Identity Relationship Management
sponsored by ForgeRock
WHITE PAPER: Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


How Attackers Use Stolen Keys and Certificates
sponsored by Venafi
WHITE PAPER: This white paper breaks down the process hackers use when compromising your keys and certificates and discusses what you can do to stop them.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement