Access Control Reports

E-Guide: How to tie SIM to identity management for security effectiveness
sponsored by TechTarget Security
EGUIDE: Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

TechTarget Security

E-Book: Strategic guide to insider threat detection and breach response
sponsored by TechTarget Security
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

TechTarget Security

April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011

Information Security Magazine

Adaptive Access Management: An ROI Study
sponsored by Oracle Corporation
WHITE PAPER: Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
Posted: 31 Mar 2011 | Published: 01 Sep 2010

Oracle Corporation

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

Wireless LAN Management Solution Overview
sponsored by Juniper Networks, Inc.
BROCHURE: Juniper Networks Wireless LAN Management portfolio helps network managers and administrators oversee and control both the WLAN infrastructure and its mobility services.
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Forrester Study: The Total Economic Impact of Oracle Identity Analytics
sponsored by Oracle Corporation
ANALYST REPORT: Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.
Posted: 22 Mar 2011 | Published: 01 Dec 2010

Oracle Corporation

Smart Strategies for Securing Extranet Access
sponsored by Oracle Corporation
WHITE PAPER: Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.
Posted: 21 Mar 2011 | Published: 01 Mar 2010

Oracle Corporation

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

Presentation Transcript: Changing Authentication Options
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT: Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

ActivIdentity Corporation

Presentation Transcript: Risk Mitigation – Bang for the Buck
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT: Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

ActivIdentity Corporation

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Information Security Magazine

Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
sponsored by Radiant Logic, Inc.
WHITE PAPER: Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.
Posted: 15 Mar 2011 | Published: 14 Mar 2011

Radiant Logic, Inc.

How Can You Prepare for the Consumerization of IT
sponsored by DynTek & McAfee
WHITE PAPER: The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.
Posted: 11 Mar 2011 | Published: 10 Mar 2011

DynTek  & McAfee

Choosing the Right Metropolitan Ring for Your Business
sponsored by AT&T Corp
WHITE PAPER: Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
sponsored by IBM
WHITE PAPER: When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

E-Book: Technical Guide on Managing Identities and Access Control
sponsored by CA Technologies
EBOOK: SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
Posted: 23 Dec 2010 | Published: 23 Dec 2010

CA Technologies

Higher Security, Greater Access with Oracle Desktop Virtualization
sponsored by Oracle Corporation
WHITE PAPER: Read this whitepaper to gather an overview of Oracle’s strategy for desktop virtualization. In addition, the paper outlines the capabilities and benefits of Oracle’s desktop virtualization solutions and provides an overview of Oracle desktop virtualization products.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

Oracle Corporation

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks