Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Network Access Control Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Access Control SoftwareReports
 
CW buyer’s guide: managing identity & access
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Alegent Health Implements Courion Solutions to Deliver Access Assurance
sponsored by Courion Corporation
CASE STUDY: This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
Posted: 15 Apr 2010 | Published: 01 Dec 2009

Courion Corporation

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

PhoneFactor Case Study: Fredrikson & Byron, P.A.
sponsored by PhoneFactor
CASE STUDY: Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

PhoneFactor

Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006

ForeScout Technologies, Inc.

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

Presentation Transcript: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PRESENTATION TRANSCRIPT: This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Aveksa

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
TECHNICAL ARTICLE: Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement