IT Management  >   Systems Operations  >   Security  >  

Administration (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Administration (Security)Reports
 
A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system.
Posted: 21 Oct 2009 | Published: 21 Oct 2009

BeyondTrust Corporation

Nortel WLAN 2300 Series Solution Brief
sponsored by Nortel Networks Corporation
PRODUCT LITERATURE: The Nortel WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today's business, IP Telephony and converged multimedia applications.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Nortel Networks Corporation

Soarian Information Access: Simplifying and Extending Care Processes
sponsored by Siemens
WHITE PAPER: This white paper features a simplified information access solution that enables healthcare providers with anytime, anywhere workflows to help improve efficiencies and patient care.
Posted: 15 Apr 2014 | Published: 31 Mar 2013

Siemens

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
sponsored by SearchCIO.com
EZINE: Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchCIO.com

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

You Are the Target - But You Don't Have To Be with Effective Authentication
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: In this analyst report by Frost & Sullivan, uncover 5 case studies on organizations of all sizes that found passwords to be subpar in security measures. Learn how they benefited from a multi-factor authentication platform, which ensured that only authorized users could access their private, dynamic networks.
Posted: 14 Nov 2013 | Published: 31 Aug 2013

RSA, The Security Division of EMC

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Aruba Networks

SSL Certificate Management: Avoiding Common Mistakes
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
Posted: 15 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement