IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control ListsReports
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
BROCHURE: In this brochure, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

Effective Access Control Strategies
sponsored by HID
EGUIDE: In this expert e-guide, get the answers you need for securing enterprise mobile access. Read on for several considerations surrounding two-factor mobile authentication, as well as effective access control strategies to protect a user's identity.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

HID

Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY: In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013

HID

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security
sponsored by Imprivata
WHITE PAPER: This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs.
Posted: 08 Apr 2014 | Published: 28 Feb 2014

Imprivata

Figuring Out FIDO
sponsored by HID
PRESENTATION TRANSCRIPT: This expert webcast transcript explains the benefits of following the FIDO standard for universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 08 Aug 2014 | Published: 06 Aug 2014

HID

Identity and access management (IAM) in the cloud Challenges galore
sponsored by IBM
EGUIDE: This expert e-guide points out challenges surrounding IAM in the cloud that Indian businesses are now dealing with.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Nissan Europe Drives Security with HID Global’s Smart Employee ID
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe, which manages their cars across 34 European countries. The organization was on the hunt for a solution that would easily enable future applications and credentials by using a single dual-chip smart card.
Posted: 10 Jul 2014 | Published: 25 Mar 2013

HID

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement