Software  >   Systems Software  >   Security Software  >   Network Security Software  >  

Access Control Software

RSS Feed   
ALSO CALLED: Network Access Control Software
DEFINITION: Software that protects a system against unauthorized access.
Access Control Software Reports
1 - 25 of 93 Matches Previous Page  |  Next Page
Identity Insider: Take on the Future
sponsored by SailPoint Technologies
WHITE PAPER: With security such an important topic for literally every person around the world, it's time for people to gain a better understanding of innovations coming to the industry. In the 3rd annual Identity Insider, explore a number of articles which discuss how identity and access management will be affected by innovation in 2020.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

SailPoint Technologies

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 21 Aug 2019 | Published: 19 Aug 2019

OneLogin

CyberArk Global Advanced Threat Landscape Report 2019
sponsored by CyberArk Software, Inc
ANALYST REPORT: In order to gain a better understanding of business leaders' engagement with cybersecurity as global organizations transition to true digital businesses, CyberArk conducted a survey. The survey also focuses on the practice of privileged access security. Download the report to explore key findings.
Posted: 20 Aug 2019 | Published: 31 Aug 2019

CyberArk Software, Inc

Identity Governance: The Great Enabler
sponsored by SailPoint Technologies
ANALYST REPORT: To understand how leading organizations are governing the digital identities of their employees and enhancing security in an age of rapid digital transformation, Forbes insights in association with SailPoint surveyed 200 senior technology executives at mid-market corporations. Download this report to explore highlights.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

SailPoint Technologies

Norfolk County Council Bolsters Productivity with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

SailPoint Technologies

Total Access Control Addresses Risk-based Security for Any Device and Application
sponsored by PortSys
CASE STUDY: While all companies are concerned about security, those in the financial services industry are especially so. In this case study, learn how a financial services firm was provided risk-based security with PortSys Total Access Control.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

PortSys

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

Privacy: Data Protection and Identity Management
sponsored by Micro Focus
WEBCAST: To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.
Posted: 10 Jul 2019 | Premiered: Feb 28, 2019

Micro Focus

Learn How to Control Access to Sensitive Data in Your Data Lake
sponsored by Okera
VIDEO: In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.
Posted: 24 Jun 2019 | Premiered: 24 Jun 2019

Okera

Okera reduces friction for datadriven initiatives with global data access management
sponsored by Okera
RESEARCH CONTENT: In this report from 451 Research, learn how Okera's global data access management platform can help reduce friction in IT enterprise environments with finer grained access controls and increased visibility. Explore Okera's strengths and weaknesses, and decide if a data access platform is right for your organization.
Posted: 20 Jun 2019 | Published: 22 May 2019

Okera

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Onfido

How to Improve Your Mobile Authentication Practices
sponsored by Onfido
EGUIDE: The most common mobile authentication methods include a variety of risks which could leave your mobile devices open for hackers to roam freely. In this e-guide learn why a strong mobile authentication strategy should include a biometric factor, and why IT should consider implementing a multifactor authentication process.
Posted: 31 May 2019 | Published: 29 May 2019

Onfido

TeamViewer Tensor Integration Webinar
sponsored by TeamViewer
WEBCAST: TeamViewer Tensor has changed the paradigm of remote connectivity by allowing you to assign appropriate user access rights to employees so they can get full desktop access to their work computers and network servers. In this webcast, explore key benefits of TeamViewer Tensor.
Posted: 28 May 2019 | Premiered: May 28, 2019

TeamViewer

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by Comforte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

Comforte AG

Hitachi ID Privileged Access Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: With Hitachi Identity Manager, organizations can move access changes out of IT to a mix of automated, HR-driven processes and request/approval workflows driven by business users. Download this solution brief to learn more about the benefits and capabilities of Identity Manager today.
Posted: 01 May 2019 | Published: 01 May 2019

Hitachi ID

The Evolution and Application of Identity Proofing
sponsored by Evident
WHITE PAPER: Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

The Sharing Economy - The 7 Challenges of Online Identity Verification
sponsored by Evident
WHITE PAPER: The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

Dropbox Business Security
sponsored by Dropbox
WHITE PAPER: In this white paper, explore your collaboration platform options with Dropbox Business. Get an overview of Dropbox product features, and explore the security a Dropbox Business collaboration platform can offer your organization.
Posted: 18 Apr 2019 | Published: 31 Dec 2018

Dropbox

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global
1 - 25 of 93 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement