IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

User Provisioning

RSS Feed    Add to Google    Add to My Yahoo!
User ProvisioningReports
 
Creating and Enforcing Advanced Access Policies with Citrix XenApp
sponsored by Citrix
WHITE PAPER: IT needs a more granular way to manage and secure user access the right way for every scenario. Read on to find out how you can secure app delivery and achieve advanced access control with XenApp.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Citrix

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Top 5 Requirements for Today’s NGFW
sponsored by Fortinet, Inc.
VIDEO: Popular data breaches like those at eBay and Monsanto have led to an increasing desire among organizations to leverage next generation firewalls. This webinar explains the top drivers, features, and decision criteria for these firewalls.
Posted: 30 Jul 2014 | Premiered: 06 Jun 2014

Fortinet, Inc.

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement