IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed    Add to Google    Add to My Yahoo!
Access Control ListsReports
 
Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Multi-Step Authentication and Why You Should Use It
sponsored by Global Knowledge
WHITE PAPER: Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
Posted: 05 Sep 2013 | Published: 08 Aug 2013

Global Knowledge

Licensing: The Next Great Disruptor to the Data Protection Status Quo
sponsored by Asigra
WHITE PAPER: Download this report to learn how recovery-centric licensing can benefit your organization.
Posted: 14 Feb 2014 | Published: 31 Jul 2013

Asigra

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Soarian Information Access: Simplifying and Extending Care Processes
sponsored by Siemens
WHITE PAPER: This white paper features a simplified information access solution that enables healthcare providers with anytime, anywhere workflows to help improve efficiencies and patient care.
Posted: 15 Apr 2014 | Published: 31 Mar 2013

Siemens

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Presentation Transcript: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
TRANSCRIPT: In this resource, Phil Cox, consultant at SystemExperts Corporation, explains how to successfully extend your identity and access management (IAM) solution to the cloud.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

OpenIAM

Unified Access and Optimization with F5 BIG-IP Edge Gateway
sponsored by F5 Networks
WHITE PAPER: This exclusive paper examines a gateway solution that integrates security, availability, and application acceleration services to enable context-aware networking, providing the unified access that today's mobile users need while keeping mobile data secure.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement