Access Control Reports

E-Guide: Evaluating IaaS security risks
sponsored by TechTarget Security
EGUIDE: This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that need to be considered in the cloud.
Posted: 13 Jun 2011 | Published: 13 Jun 2011

TechTarget Security

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security

E-Guide: How to tie SIM to identity management for security effectiveness
sponsored by TechTarget Security
EGUIDE: Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

TechTarget Security

Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER: As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011

Oracle Corporation

AppSense The Low down: What does user virtualization boil down to?
sponsored by AppSense
PRODUCT OVERVIEW: Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

AppSense

E-Guide: Expert guide to Access Management Services in the Cloud
sponsored by Intel
EGUIDE: This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
Posted: 26 May 2011 | Published: 26 May 2011

Intel

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Architecting a vCloud
sponsored by VMware, Inc.
WHITE PAPER: If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
sponsored by Intel
PRESENTATION TRANSCRIPT: User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
Posted: 20 May 2011 | Published: 20 May 2011

Intel

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

End-to-End Secure Client to Cloud Access Presentation Transcript
sponsored by Intel
PRESENTATION TRANSCRIPT: In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.
Posted: 06 May 2011 | Published: 06 May 2011

Intel

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Better Leveraging Active Directory
sponsored by Radiant Logic, Inc.
WHITE PAPER: Find out how your business can have a better and more efficient identity management system in this white paper.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Radiant Logic, Inc.

Forrester Report: The Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
ANALYST REPORT: This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
Posted: 08 Apr 2011 | Published: 03 Nov 2008

Oracle Corporation

Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
sponsored by Imprivata
WHITE PAPER: This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Imprivata

April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011

Information Security Magazine

Adaptive Access Management: An ROI Study
sponsored by Oracle Corporation
WHITE PAPER: Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
Posted: 31 Mar 2011 | Published: 01 Sep 2010

Oracle Corporation

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

Wireless LAN Management Solution Overview
sponsored by Juniper Networks, Inc.
BROCHURE: Juniper Networks Wireless LAN Management portfolio helps network managers and administrators oversee and control both the WLAN infrastructure and its mobility services.
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Forrester Study: The Total Economic Impact of Oracle Identity Analytics
sponsored by Oracle Corporation
ANALYST REPORT: Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.
Posted: 22 Mar 2011 | Published: 01 Dec 2010

Oracle Corporation

Smart Strategies for Securing Extranet Access
sponsored by Oracle Corporation
WHITE PAPER: Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.
Posted: 21 Mar 2011 | Published: 01 Mar 2010

Oracle Corporation

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

Presentation Transcript: Changing Authentication Options
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT: Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

ActivIdentity Corporation