IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Privileges

RSS Feed    Add to Google    Add to My Yahoo!
Privileges Reports
 
Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

FICO Seeds the Cloud
sponsored by Red Hat
WHITE PAPER: Read this white paper to find out how FICO got the Platform-as-a-Service tools it needed to operate a Decision Management Platform, becoming the market's leading solution for business rules management, predictive analytics, data and text mining, optimization, visualization, and reporting.
Posted: 20 May 2015 | Published: 31 Oct 2014

Red Hat

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Data Management Designed for the Web, Mobile and Internet of Things Era
sponsored by IBM
WHITE PAPER: Database-as-a-Service (DBaaS) helps enable you to buy into a data management Service Level Agreement (SLA) instead of buying into a database technology, simplifying app development and delivery.Read this white paper to find out all the ways DBaaS can benefit your organization.
Posted: 06 Apr 2015 | Published: 31 Jan 2015

IBM

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

ACG Research Market Impact Report on ACX Series Universal Access Routers
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the details of Juniper’s ACX Series Universal Access Routers, which can help extend the core/edge of IP/MPLS solutions to deliver end-to-end manageability, provide low-cost access, and meet the needs of both fixed and mobile operators.
Posted: 01 May 2012 | Published: 29 Feb 2012

Juniper Networks, Inc.

On Lockdown: HMV/Waterstone’s asserts control over user activity
sponsored by Safestone Technologies
CASE STUDY: Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Safestone Technologies

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement