IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access PoliciesReports
 
What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

International Mobile Security: Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Proven, Trusted and HIPAA-Compliant Media Management
sponsored by Iron Mountain
WHITE PAPER: This resource features a media management partner that offers security and compliance tools for your tape backup and archive to ensure you consistently are up to par with the latest HIPAA updates.
Posted: 10 Apr 2014 | Published: 23 Oct 2013

Iron Mountain

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement