Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Access Control Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Access Control Software
DEFINITION: Software that protects a system against unauthorized access.
Access Control SoftwareReports
51 - 75 of 114 Matches Previous Page  | Next Page
The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

Manage Physical Access Control within a Virtual Server Environment
sponsored by RedCloud Security
WHITE PAPER: Explore how to manage physical access control within a virtual server environment. View this data sheet to uncover RedCloud Virtual, a web-based, access control virtual appliance that allows organizations to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Protect Single Buildings and Campuses with Easy, Web-based Access Control
sponsored by RedCloud Security
DATA SHEET: Uncover how to protect individual buildings and campuses easily with the web-based access control network appliance, RedCloud Express. View this data sheet now to learn more and discover how this access control platform delivers powerful, plug-and-play protection in an affordable, all-in-one security management solution.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER: This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
sponsored by HyTrust
CASE STUDY: With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure
sponsored by HyTrust
CASE STUDY: To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services
sponsored by HyTrust
CASE STUDY: With a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities
sponsored by HyTrust
CASE STUDY: With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Oracle Identity Analytics- A Business Perspective
sponsored by Oracle Corporation
WHITE PAPER: This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
Posted: 13 Jun 2011 | Published: 01 Feb 2010

Oracle Corporation

Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER: As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011

Oracle Corporation

AppSense The Low down: What does user virtualization boil down to?
sponsored by AppSense
PRODUCT OVERVIEW: Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

AppSense

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Choosing a Network Access Control (NAC) Solution that is Right for Your Network
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

ForeScout Technologies, Inc.

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
TECHNICAL ARTICLE: Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

Dell Software

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Posted: 01 Oct 2010 | Published: 01 Jun 2010

CA Technologies

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
Posted: 22 Sep 2010 | Published: 01 Jun 2010

CA Technologies.

E-Book: Best Practices - How to implement and maintain enterprise user roles
sponsored by CA Technologies
EBOOK: Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

CA Technologies

PowerTerm WebConnect - Free 30 Day Trial!
sponsored by Ericom Software
TRIAL SOFTWARE: PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization,  Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces.
Posted: 29 Jun 2010 | Premiered: 29 Jun 2010

Ericom Software

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Privileged user management: It's time to take control
sponsored by CA Technologies
WHITE PAPER: IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.
Posted: 01 Jun 2010 | Published: 01 Oct 2009

CA Technologies
51 - 75 of 114 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement