IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control Lists

RSS Feed   
Access Control Lists Reports
 
PortSys Total Access Control Case Study
sponsored by PortSys
RESOURCE: While all companies are concerned about security, those in the financial services industry are especially so. Read this case study to see how a financial services firm used PortSys Total Access Control to address risk-based security for their devices and applications.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin

All Access Is Not Created Equal
sponsored by PortSys
RESOURCE: “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Zero Trust Privilege for Dummies
sponsored by Centrify Corporation
EBOOK: To better protect against data breaches, the use of a Zero-Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of "trust, but verify," the Zero-Trust model implements "never trust, always verify" as its guiding principle. Download Zero Trust Privilege For Dummies to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

NIST SP 800-171 and CUI
sponsored by TITUS
PRODUCT OVERVIEW: NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

TITUS

Strategies to Ensure Success for your Governance Project
sponsored by One Identity
EBOOK: In years past when talking about IAM, the hot topics were single sign-on and role-based access control. However, governance is the goal now, and many organizations are finding it hard to reach. Learn about Identity and Access Governance (IAG), why it's important and how your organization can make an IAG program successful.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

One Identity

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

Improving Lives Around the World through Easier Access to Knowledge
sponsored by PortSys
CASE STUDY: Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement