IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed    Add to Google    Add to My Yahoo!
Privileges Reports
 
6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Single-Sign-On: Streamlining Remote Access
sponsored by SecureAuth
CASE STUDY: This case study explores how to use multi-factor authentication and single-sign-on (SSO) to remove the reliance on tokens and secure access to the enterprise network and data. Access now to examine how one organization was able to overcome authentication and access challenges using this strategy.
Posted: 07 May 2015 | Published: 25 Feb 2015

SecureAuth

Matrix42 MyWorkspace: Easy for IT. Easy for Users.
sponsored by Matrix42
WEBCAST: This webcast invites users to explore the streamlining potential of a unified workspace portal. Learn how to enable simplified management and access to apps, corporate documents, devices, and more.
Posted: 11 Jun 2015 | Premiered: Jun 11, 2015

Matrix42

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

ACG Research Market Impact Report on ACX Series Universal Access Routers
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the details of Juniper’s ACX Series Universal Access Routers, which can help extend the core/edge of IP/MPLS solutions to deliver end-to-end manageability, provide low-cost access, and meet the needs of both fixed and mobile operators.
Posted: 01 May 2012 | Published: 29 Feb 2012

Juniper Networks, Inc.

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by SearchNetworking.com
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

SearchNetworking.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement