Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control Facility Reports
 
Protect Against Email-Borne Threats
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how advanced threat protection can uncover and prioritize sophisticated attacks entering your organization through email. Discover how you can leverage targeted attack identification, detailed malware reporting, data correlation, a consolidated view of attacks across endpoints, networks, and email, and more.
Posted: 02 Dec 2015 | Published: 31 Oct 2015

Symantec Corporation

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015

Webroot

On-Premise or in the Cloud, Java Development Can Generate Revenue
sponsored by Red Hat
WHITE PAPER: Globalization and localized business changes have increased requirements for new applications that extend the reach of enterprises into new markets and geographics. Learn methods for delivering high-impact, revenue-generating applications for today's border-defying audience.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Red Hat

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

Key Cloud Development Findings
sponsored by Red Hat
WHITE PAPER: This report, which features findings from more than 600 IT professionals, highlights the state of cloud development. Discover research-backed answers to questions about PaaS selection, as well as an overview of top cloud security inquiries.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Red Hat

SANS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

AlienVault

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Turn IT from a Cost Center into a Profit Center
sponsored by Red Hat
WHITE PAPER: Access this data sheet to make the business case for more collaboration, better interoperability between conventional and new platforms, lower TCO and higher security with open source development tools.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Red Hat

Computer Weekly – 12 May 2015: Augmented reality comes to corporate IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from early adopter Zurich Insurance about how augmented reality apps can become part of the corporate IT landscape. We look at Microsoft's Nano Server – the cut-down version of Windows Server designed for the cloud. And we assess the implications of the Nokia acquisition of Alcatel-Lucent. Read the issue now.
Posted: 08 May 2015 | Published: 08 May 2015

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement