IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Wireless Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Access ControlReports
 
The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge

4 Key Components for an Enhanced Mobility Infrastructure
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover the four components that are crucial to creating a flexible network access solution for mobile users, including flexible access management and scalable wired infrastructure.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Dell, Inc.

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Securely Deliver New Business Services
sponsored by CA Technologies.
WHITE PAPER: This whitepaper examines the critical factors organizations must consider when it comes to meeting the balance between improving end-user engagement and maintaining proper security, focusing on the importance of strong identity and access management.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.

Fighting Banking Fraud Without Driving Away Customers
sponsored by iovation, Inc.
WHITE PAPER: Discover a fraud prevention solution that offers advanced device identification and reputation services, and improves the overall customer experience with online banking—at the same time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Exercising Control Over Mobile Access
sponsored by Aruba Networks
EGUIDE: In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

Aruba Networks

Security Compliance:  A Common Thread
sponsored by CDW Corporation
RESOURCE: Access this infographic to discover how to properly secure your information and meet major compliance mandates for healthcare, finance and government data.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

European Mobile Phone Retailer, the Carphone Warehouse, Secures Employee Remote Access with HID Global’s Authentication Solutions
sponsored by HID
CASE STUDY: This case study examines how a London-based mobile communications retailer secures employee remote access. Read on to find out why this retailer chose HID Global over other vendors due to the strong authentication characteristics behind it.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement