IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

ACLs

RSS Feed   
ACLs Reports
 
Protecting and Monitoring Access to a State's Systems
sponsored by One Identity
CASE STUDY: Learn how this state improves security, efficiency, and insight into who accesses which systems by replacing 18 IAM systems with a comprehensive platform from One Identity.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Bolster Your DLP Systems for Safer File Sharing and Collaboration
sponsored by FinalCode
EGUIDE: In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

FinalCode

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by Globalscape
CASE STUDY: This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013

Globalscape

DataWorks Solution Brief
sponsored by IBM
WHITE PAPER: 42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.
Posted: 09 Jun 2016 | Published: 31 Dec 2015

IBM

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement