IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
226 - 250 of 553 Matches Previous Page  |  Next Page
Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
sponsored by SearchSecurity.com
EBRIEF: This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

SearchSecurity.com

Expert Tips for Managing Mobile Devices in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

SearchSecurity.com

E-Guide: Securing the SIEM system: Control access, prioritize availability
sponsored by SearchSecurity.com
EGUIDE: Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

Cloud IAM: Is it worth the move?
sponsored by SearchSecurity.com
EGUIDE: As cloud adoption increases, managers are beginning to consider integrating their IAM infrastructure into cloud architectures. In this e-guide, gain expert insight into cloud IAM including how to use a IAM Maturity model to improve IAM strategy, key considerations before moving to a cloud-based service and much more.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

E-Guide: Achieving compliance through IAM
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

SearchSecurity.com

E-Guide: IAM in the cloud
sponsored by SearchSecurity.com
EGUIDE: When bringing your organization into the cloud, there are a few steps that need to be taken in order to ensure security. One of the main areas that needs to be appropriately integrated is identity management. Read this expert E-Guide and discover how to manage identity in the cloud, along with whom and what you can trust in the cloud.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

SearchSecurity.com

Maintaining security in managed services
sponsored by SearchSecurity.com
EGUIDE: Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

SearchSecurity.com

Converged Management for Wired and Wireless Networks
sponsored by Cisco Systems, Inc.
PRODUCT OVERVIEW: Discover how Cisco’s Prime Network Control System (NCS), a converged management platform for wired and wireless networks, can help you improve operational efficiencies, reduce operating expenses, and lower capital expenditures for your organization.
Posted: 21 Mar 2012 | Published: 30 Nov 2011

Cisco Systems, Inc.

Manage Physical Access Control within a Virtual Server Environment
sponsored by RedCloud Security
WHITE PAPER: Explore how to manage physical access control within a virtual server environment. View this data sheet to uncover RedCloud Virtual, a web-based, access control virtual appliance that allows organizations to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Protect Single Buildings and Campuses with Easy, Web-based Access Control
sponsored by RedCloud Security
DATA SHEET: Uncover how to protect individual buildings and campuses easily with the web-based access control network appliance, RedCloud Express. View this data sheet now to learn more and discover how this access control platform delivers powerful, plug-and-play protection in an affordable, all-in-one security management solution.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Beverly Hills Wealth Management Case Study
sponsored by Intel
WHITE PAPER: Read this case study and learn how and why Beverly Hills Wealth Management, a Registered Investment Advisor Firm, selected Intel's Identity and Access Management Solution that combines single sign-on, user account provisioning/deprovisioning, and access management for its users.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Intel

Infrastructure, Interrupted: Apple in the Enterprise Redefined
sponsored by Acronis
WHITE PAPER: Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization.
Posted: 16 Feb 2012 | Published: 05 Oct 2012

Acronis

Security Best Practices for the Mobile Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Maximizing the Strategic Point of Control in the Application Delivery Network
sponsored by F5 Networks
WHITE PAPER: Improve performance, implement security procedures, and institute server redundancy that is invisible to the user by leveraging the strategic point of control that exists between the servers in the data center and the Internet.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

F5 Networks

Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication
sponsored by RSA
WHITE PAPER: With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

RSA

Understanding, Building and Securing an IAM Cloud Architecture
sponsored by OneLogin
PRESENTATION TRANSCRIPT: This presentation transcript will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

OneLogin

Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER: This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

Best Practices for Effective Network Access Control
sponsored by Bradford Networks
WHITE PAPER: There is often confusion between the functions and benefits of 802.1X and those of commercially available NAC solutions. Which is best for particular networks? View now to explore the fundamentals of 802.1X and NAC technologies and why both is often required to provide the level of security, control and visibility needed in today’s network.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

Can You Have Your Cloud and Be Secure Too? You Can
sponsored by CA Technologies.
WHITE PAPER: Can you have your cloud and be secure too? Yes, you can! Read this white paper to learn about the latest cloud security services that allow you to effectively address concerns regarding identity, access control, and auditing while providing elasticity and agility.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

CA Technologies.

Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
sponsored by StrikeForce Technologies
PRESENTATION TRANSCRIPT: Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

StrikeForce Technologies

IT in Europe: Breaking the Code: Are passwords destined for obscurity?
sponsored by SearchSecurity.co.UK
EZINE: This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

SearchSecurity.co.UK

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure
sponsored by Intel
WHITE PAPER: In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Intel

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST: Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel
226 - 250 of 553 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement