IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access PoliciesReports
 
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

How to Protect Unstructured Data
sponsored by Digital Guardian
WHITE PAPER: This white paper outlines a data protection model that is used to control unstructured data by identifying and applying policy-based controls over the data's lifecycle.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Evolving Security Efforts to Meet PCI DSS v.3.0 Compliance Requirements
sponsored by CDW Corporation
WHITE PAPER: This white paper reveals the latest version of the payment card standard, which includes clarifications and new requirements that organizations must comply with by the end of 2014.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 21 Jul 2014 | Published: 15 Nov 2012

Dell, Inc. and Intel®

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Mobile at Work: What You Don’t Know Can Hurt You
sponsored by Bluebox
RESOURCE: With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

Bluebox

Implementing Privileged Account Security to Address Advanced Threats
sponsored by Cyber-Ark Software
WHITE PAPER: In this informative Q&A, you'll get inside information from industry analysts as they discuss the best security practices for IT professionals, why privileged account security is vital to a successful security plan, and how to protect your systems from new strategies utilized by cybercriminals.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Cyber-Ark Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement