IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

NAC

RSS Feed    Add to Google    Add to My Yahoo!
NAC Reports
 
Keeping the Keys to Your Cloud Future Secure
sponsored by Entrust, Inc.
RESOURCE: Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.
Posted: 11 Jan 2017 | Published: 15 Sep 2016

Entrust, Inc.

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Buyers guide to cloud based I&M mgmt
sponsored by IBM
RESOURCE: Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

IBM

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
NAC White Papers | NAC Multimedia | NAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement